Please use this identifier to cite or link to this item:
|Title:||A Low-Power and High-throughput implementation of the SHA-1 hash function||Authors:||Michail, Harris
Kakarountas, Athanasios P.
Koufopavlou, Odysseas G.
|Keywords:||Wireless Application Protocol (Computer network protocol);Hardware;Computer hardware description languages;Integrated circuit--Design and construction||Issue Date:||2005||Publisher:||IEEE||Source:||IEEE International Symposium on Circuits and Systems, 2005, Kobe, Japan,||Abstract:||The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach to a limit. Furthermore, due to the tendency of the market to minimize devices' size and increase their autonomy to make them portable, power issues have also to be considered. The existing SHA-1 Hash Function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbps. In this paper, a new implementation comes to exceed this limit improving the throughput by 53%. Furthermore, power dissipation is kept low compared to previous works.||URI:||http://ktisis.cut.ac.cy/handle/10488/7379||ISSN:||02714310||DOI:||10.1109/ISCAS.2005.1465529||Rights:||© 2005 IEEE||Type:||Conference Papers|
|Appears in Collections:||Δημοσιεύσεις σε συνέδρια/Conference papers|
Show full item record
checked on Nov 5, 2018
Page view(s) 2069
checked on Nov 13, 2018
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.