FPGA Implementations of the Round Two SHA-3 Candidates

Field Programmable Logic and Applications(2010)

引用 123|浏览0
暂无评分
摘要
The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper presents the full implementations of all of the second round candidates in hardware with all of their variants. In order to determine their computational efficiency, an important aspect in NIST's round two evaluation criteria, this paper gives an area/speed comparison of each design both with and without a hardware interface, thereby giving an overall impression of their performance in resource constrained and resource abundant environments. The implementation results are provided for a Virtex-5 FPGA device. The efficiency of the architectures for the hash functions are compared in terms of throughput per unit area. To the best of the authors' knowledge, this is the first work to date to present hardware designs which test for all message digest sizes (224, 256, 384, 512), and also the only work to include the padding as part of the hardware for the SHA-3 hash functions.
更多
查看译文
关键词
sha-3,resource constrained,nist-run public competition,cryptography,computational efficiency,resource abundant environment,round candidate,virtex-5 fpga device,fpga implementation,nist secure hash standard,fpga implementations,sha-3 candidates,hash function,fpga,hardware design,hardware interface,new hash algorithm,hash,unit area,field programmable gate arrays,round two sha-3 candidate,hash algorithm,sha 3,radiation detectors,hardware,nist,throughput,read only memory
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要