Please use this identifier to cite or link to this item:
Title: A Low-Power and High-throughput implementation of the SHA-1 hash function
Authors: Michail, Harris 
Kakarountas, Athanasios P.
Koufopavlou, Odysseas G.
Keywords: Wireless Application Protocol (Computer network protocol);Hardware;Computer hardware description languages;Integrated circuit--Design and construction
Issue Date: 2005
Publisher: IEEE
Source: IEEE International Symposium on Circuits and Systems, 2005, Kobe, Japan,
Abstract: The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach to a limit. Furthermore, due to the tendency of the market to minimize devices' size and increase their autonomy to make them portable, power issues have also to be considered. The existing SHA-1 Hash Function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbps. In this paper, a new implementation comes to exceed this limit improving the throughput by 53%. Furthermore, power dissipation is kept low compared to previous works.
ISSN: 02714310
DOI: 10.1109/ISCAS.2005.1465529
Rights: © 2005 IEEE
Type: Conference Papers
Appears in Collections:Δημοσιεύσεις σε συνέδρια/Conference papers

Show full item record

Citations 10

checked on Nov 5, 2018

Page view(s) 20

Last Week
Last month
checked on Nov 13, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.