Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/13947
DC FieldValueLanguage
dc.contributor.authorAthanasiou, George S.-
dc.contributor.authorTheodoridis, George-
dc.contributor.authorChalkou, Chara I.-
dc.contributor.authorGoutis, Costas E.-
dc.contributor.authorMichail, Harris-
dc.contributor.authorBardis, D.-
dc.date.accessioned2019-05-31T09:31:38Z-
dc.date.available2019-05-31T09:31:38Z-
dc.date.issued2012-07-
dc.identifier.citation(2012) SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, pp. 126-135; International Conference on Security and Cryptography, SECRYPT 2012; Rome; Italy; 24 July 2012 through 27 July 2012en_US
dc.identifier.isbn978-989856524-2-
dc.description.abstractHash functions are exploited by many cryptographic primitives that are incorporated in crucial cryptographic schemes and commercial security protocols. Nowadays, there is an active international competition, launched by the National Institute of Standards and Technology (NIST), for establishing the new hash standard, SHA-3. One of the semi-finalists is the JH algorithm. In this paper, two high throughput hardware architectures of the complete JH algorithm are presented. The difference between them is the existence of 3 pipeline stages at the second one. They both are designed to support all the possible versions of the algorithm and are implemented in Xilinx Virtex-4, Virtex-5, and Virtex-6 FPGAs. Based on the experimental results, the proposed architectures outperform the existing ones in terms of Throughput/Area factor, regarding all FPGA platforms and JH algorithm's versions.en_US
dc.description.sponsorshipInst. Syst. Technol. Inf., Control Commun. (INSTICC)en_US
dc.language.isoenen_US
dc.subjectCryptographyen_US
dc.subjectHash functionsen_US
dc.subjectSecurityen_US
dc.subjectHardware architectureen_US
dc.titleHigh-throughput hardware architectures of the JH round-three SHA-3 candidate: An FPGA design and implementation approachen_US
dc.typeConference Papersen_US
dc.collaborationUniversity of Patrasen_US
dc.collaborationCyprus University of Technologyen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.relation.conferenceInternational Conference on Security and Cryptographyen_US
dc.identifier.scopus2-s2.0-84867636718en
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/84867636718en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
cut.common.academicyear2011-2012en_US
item.openairecristypehttp://purl.org/coar/resource_type/c_c94f-
item.openairetypeconferenceObject-
item.cerifentitytypePublications-
item.grantfulltextnone-
item.languageiso639-1en-
item.fulltextNo Fulltext-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation
CORE Recommender
Show simple item record

Page view(s) 50

316
Last Week
0
Last month
9
checked on Nov 21, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.