Please use this identifier to cite or link to this item:
Title: Novel high throughput implementation of SHA-256 hash function through pre-computation technique
Authors: Michail, Harris 
Milidonis, Athanasios S.
Kakarountas, Athanasios P.
Keywords: Communication;Functions;Application software;Authentication;Extranets (Computer networks)
Issue Date: 2005
Publisher: IEEE
Source: Proceedings of the IEEE International Conference on Electronics, Circuits and Systems, 2005, Pages 1- 4
Abstract: Hash functions are utilized in the security layer of every communication protocol and in signature authentication schemes for electronic transactions. As time passes more sophisticated applications-that invoke a security layer-arise and address to more users-clients. This means that all these applications demand for higher throughput. In this work a pre-computation technique has been developed for optimizing SHA-256 which has already started replacing both SHA-l and MD-5. Comparing to conventional pipelined implementations of SHA-256 hash function the applied pre-computation technique leads to about 30% higher throughput with only an area penalty of approximately 9.5%.
ISBN: 978-997261100-1
DOI: 10.1109/ICECS.2005.4633433
Rights: © IEEE
Type: Book Chapter
Appears in Collections:Κεφάλαια βιβλίων/Book chapters

Show full item record


checked on May 1, 2018

Page view(s)

Last Week
Last month
checked on Feb 18, 2019

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.