Please use this identifier to cite or link to this item: http://ktisis.cut.ac.cy/handle/10488/7376
Title: Novel high throughput implementation of SHA-256 hash function through pre-computation technique
Authors: Michail, Harris 
Milidonis, Athanasios S.
Kakarountas, Athanasios P.
Keywords: Communication
Functions
Application software
Authentication
Extranets (Computer networks)
Issue Date: 2005
Publisher: IEEE
Source: Proceedings of the IEEE International Conference on Electronics, Circuits and Systems, 2005, Pages 1- 4
Abstract: Hash functions are utilized in the security layer of every communication protocol and in signature authentication schemes for electronic transactions. As time passes more sophisticated applications-that invoke a security layer-arise and address to more users-clients. This means that all these applications demand for higher throughput. In this work a pre-computation technique has been developed for optimizing SHA-256 which has already started replacing both SHA-l and MD-5. Comparing to conventional pipelined implementations of SHA-256 hash function the applied pre-computation technique leads to about 30% higher throughput with only an area penalty of approximately 9.5%.
URI: http://ktisis.cut.ac.cy/handle/10488/7376
ISBN: 978-997261100-1
DOI: 10.1109/ICECS.2005.4633433
Rights: © IEEE
Appears in Collections:Κεφάλαια βιβλίων/Book chapters

Show full item record

SCOPUSTM   
Citations 50

1
checked on Mar 5, 2017

Page view(s)

3
checked on Mar 24, 2017

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.