Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/13947
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Athanasiou, George S. | - |
dc.contributor.author | Theodoridis, George | - |
dc.contributor.author | Chalkou, Chara I. | - |
dc.contributor.author | Goutis, Costas E. | - |
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Bardis, D. | - |
dc.date.accessioned | 2019-05-31T09:31:38Z | - |
dc.date.available | 2019-05-31T09:31:38Z | - |
dc.date.issued | 2012-07 | - |
dc.identifier.citation | (2012) SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, pp. 126-135; International Conference on Security and Cryptography, SECRYPT 2012; Rome; Italy; 24 July 2012 through 27 July 2012 | en_US |
dc.identifier.isbn | 978-989856524-2 | - |
dc.description.abstract | Hash functions are exploited by many cryptographic primitives that are incorporated in crucial cryptographic schemes and commercial security protocols. Nowadays, there is an active international competition, launched by the National Institute of Standards and Technology (NIST), for establishing the new hash standard, SHA-3. One of the semi-finalists is the JH algorithm. In this paper, two high throughput hardware architectures of the complete JH algorithm are presented. The difference between them is the existence of 3 pipeline stages at the second one. They both are designed to support all the possible versions of the algorithm and are implemented in Xilinx Virtex-4, Virtex-5, and Virtex-6 FPGAs. Based on the experimental results, the proposed architectures outperform the existing ones in terms of Throughput/Area factor, regarding all FPGA platforms and JH algorithm's versions. | en_US |
dc.description.sponsorship | Inst. Syst. Technol. Inf., Control Commun. (INSTICC) | en_US |
dc.language.iso | en | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Hash functions | en_US |
dc.subject | Security | en_US |
dc.subject | Hardware architecture | en_US |
dc.title | High-throughput hardware architectures of the JH round-three SHA-3 candidate: An FPGA design and implementation approach | en_US |
dc.type | Conference Papers | en_US |
dc.collaboration | University of Patras | en_US |
dc.collaboration | Cyprus University of Technology | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.relation.conference | International Conference on Security and Cryptography | en_US |
dc.identifier.scopus | 2-s2.0-84867636718 | en |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/84867636718 | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
cut.common.academicyear | 2011-2012 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_c94f | - |
item.openairetype | conferenceObject | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation |
CORE Recommender
Page view(s) 50
316
Last Week
0
0
Last month
9
9
checked on Nov 21, 2024
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.