Please use this identifier to cite or link to this item: http://ktisis.cut.ac.cy/handle/10488/7379
Title: A Low-Power and High-throughput implementation of the SHA-1 hash function
Authors: Michail, Harris 
Kakarountas, Athanasios P.
Koufopavlou, Odysseas G.
Keywords: Wireless Application Protocol (Computer network protocol)
Hardware
Computer hardware description languages
Integrated circuit--Design and construction
Issue Date: 2005
Publisher: IEEE
Source: IEEE International Symposium on Circuits and Systems, 2005, Kobe, Japan,
Abstract: The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach to a limit. Furthermore, due to the tendency of the market to minimize devices' size and increase their autonomy to make them portable, power issues have also to be considered. The existing SHA-1 Hash Function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbps. In this paper, a new implementation comes to exceed this limit improving the throughput by 53%. Furthermore, power dissipation is kept low compared to previous works.
URI: http://ktisis.cut.ac.cy/handle/10488/7379
ISSN: 02714310
DOI: 10.1109/ISCAS.2005.1465529
Rights: © 2005 IEEE
Appears in Collections:Δημοσιεύσεις σε συνέδρια/Conference papers

Show full item record

SCOPUSTM   
Citations 20

12
checked on Jan 29, 2017

Page view(s) 20

5
checked on Jan 30, 2017

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.