Please use this identifier to cite or link to this item: http://ktisis.cut.ac.cy/handle/10488/7379
Title: A Low-Power and High-throughput implementation of the SHA-1 hash function
Authors: Michail, Harris 
Kakarountas, Athanasios P.
Koufopavlou, Odysseas G.
Keywords: Wireless Application Protocol (Computer network protocol)
Hardware
Computer hardware description languages
Integrated circuit--Design and construction
Issue Date: 2005
Publisher: IEEE
Source: IEEE International Symposium on Circuits and Systems, 2005, Kobe, Japan,
Abstract: The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach to a limit. Furthermore, due to the tendency of the market to minimize devices' size and increase their autonomy to make them portable, power issues have also to be considered. The existing SHA-1 Hash Function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbps. In this paper, a new implementation comes to exceed this limit improving the throughput by 53%. Furthermore, power dissipation is kept low compared to previous works.
URI: http://ktisis.cut.ac.cy/handle/10488/7379
ISSN: 02714310
DOI: 10.1109/ISCAS.2005.1465529
Rights: © 2005 IEEE
Appears in Collections:Δημοσιεύσεις σε συνέδρια/Conference papers

Show full item record

SCOPUSTM   
Citations 20

12
checked on Jan 29, 2017

Page view(s) 10

18
checked on Mar 27, 2017

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.