Please use this identifier to cite or link to this item:
|Title:||Novel high throughput implementation of SHA-256 hash function through pre-computation technique||Authors:||Michail, Harris
Milidonis, Athanasios S.
Kakarountas, Athanasios P.
Extranets (Computer networks)
|Issue Date:||2005||Publisher:||IEEE||Source:||Proceedings of the IEEE International Conference on Electronics, Circuits and Systems, 2005, Pages 1- 4||Abstract:||Hash functions are utilized in the security layer of every communication protocol and in signature authentication schemes for electronic transactions. As time passes more sophisticated applications-that invoke a security layer-arise and address to more users-clients. This means that all these applications demand for higher throughput. In this work a pre-computation technique has been developed for optimizing SHA-256 which has already started replacing both SHA-l and MD-5. Comparing to conventional pipelined implementations of SHA-256 hash function the applied pre-computation technique leads to about 30% higher throughput with only an area penalty of approximately 9.5%.||URI:||http://ktisis.cut.ac.cy/handle/10488/7376||ISBN:||978-997261100-1||DOI:||10.1109/ICECS.2005.4633433||Rights:||© IEEE|
|Appears in Collections:||Κεφάλαια βιβλίων/Book chapters|
Show full item record
checked on Apr 18, 2017
checked on Apr 25, 2017
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.