Please use this identifier to cite or link to this item: http://ktisis.cut.ac.cy/handle/10488/7378
Title: Optimizing SHA-1 hash function for high throughput with a partial unrolling study
Authors: Michail, Harris 
Kakarountas, Athanasios P.
Selimis, George N.
Keywords: Computer software
Energy dissipation
Document imaging systems
Issue Date: 2005
Publisher: Springer
Source: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation: 15th International Workshop, PATMOS , Leuven, Belgium, September 21-23, 2005, Pages 591-600
Abstract: Hash functions are widely used in applications that call for data integrity and signature authentication at electronic transactions. A hash function is utilized in the security layer of every communication protocol. As time passes more sophisticated applications arise that address to more users-clients and thus demand for higher throughput. Furthermore, due to the tendency of the market to minimize devices' size and increase their autonomy to make them portable, power issues have also to be considered. The existing SHA-1 Hash Function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbps. In this paper, a new implementation comes to exceed this limit improving the throughput by 53%. Furthermore,power dissipation is kept low compared to previous works, in such way that the proposed implementation can be characterized as low-power.
URI: http://ktisis.cut.ac.cy/handle/10488/7378
ISBN: 978-3-540-29013-1 (print)
ISSN: 978-3-540-32080-7 (online)
DOI: 10.1007/11556930_60
Rights: © Springer-Verlag Berlin Heidelberg 2005
Appears in Collections:Κεφάλαια βιβλίων/Book chapters

Files in This Item:
File Description SizeFormat 
dOI.doc23.5 kBMicrosoft WordView/Open
Show full item record

Page view(s)

18
Last Week
0
Last month
3
checked on Aug 23, 2017

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.