Please use this identifier to cite or link to this item:
|Title:||Optimising the SHA-512 cryptographic hash function on FPGAs||Authors:||Athanasiou, George S.
Goutis, Costas E.
|Keywords:||Hash functions;Pipeline processing systems;Pipelines;Timing circuits||Category:||Electrical Engineering - Electronic Engineering - Information Engineering||Field:||Engineering and Technology||Issue Date:||1-Jan-2014||Publisher:||Institution of Engineering and Technology||Source:||IET Computers and Digital Techniques Volume 8, Issue 2, 2014, Pages 70-82||metadata.dc.doi:||10.1049/iet-cdt.2013.0010||Abstract:||In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area factors, for the SHA-512 cryptographic hash function, are proposed. To achieve this, algorithmic- and circuit-level optimisation techniques such as loop unrolling, re-timing, temporal pre-computation, resource re-ordering and pipeline are applied. All the techniques, except pipeline are applied in the function's transformation round. The pipeline was applied through the development of all the alternative pipelined architectures and implementation in several Xilinx FPGA families and they are evaluated in terms of frequency, area, throughput and throughput/area factors. Compared to the initial un-optimised implementation of SHA-512 function, the introduced five-stage pipelined architecture improves the both the throughput and throughput/area factors by 123 and 61.5%, respectively. Furthermore, the proposed five-stage pipelined architecture outperforms the existing ones both in throughput (3.4× up to 16.9×) and throughput/area (19.5% up to 6.9×) factors.||URI:||http://ktisis.cut.ac.cy/handle/10488/9699||ISSN:||17518601||Rights:||© The Institution of Engineering and Technology 2014.||Type:||Article|
|Appears in Collections:||Άρθρα/Articles|
Show full item record
Page view(s) 5060
checked on Dec 11, 2018
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.