Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/1515
Title: Novel technique for high-throughput and power efficient cryptographic primitives
Authors: Michail, Harris 
Kakarountas, Athanasios P. 
Goutis, Costas E. 
metadata.dc.contributor.other: Μιχαήλ, Χάρης
Major Field of Science: Engineering and Technology
Field Category: Electrical Engineering - Electronic Engineering - Information Engineering
Keywords: Algorithms;Security;Field programmable gate arrays
Issue Date: Jul-2005
Source: WSEAS Transactions on Circuits and Systems, 2005, vol. 4, no. 7, pp. 748-755
Volume: 4
Issue: 7
Start page: 748
End page: 755
Journal: WSEAS Transactions on Circuits and Systems 
Abstract: Most of internet applications incorporate a security layer in which a hash function is found. These applications are addressing to more and more clients and thus the corresponding server accepts a great number of service requests. In order to indulge these requests the security schemes must have a high-throughput. Furthermore, due to the tendency of the market to minimize devices' size and increase their autonomy to make them portable, power issues have also to be considered as long as the client-side is concerned. In this work the parallelism (or partial unrolling) technique is presented for increasing frequency and throughput of all widely used hash functions - and those that will be used in the future- hash functions such as MD-5, SHA-1, RIPEMD (all versions), SHA-256, SHA-384, and SHA-512 etc. The proposed parallelism technique leads to a 33%- 50% higher throughput comparing to the most competitive implementations and to much lower power dissipation.
URI: https://hdl.handle.net/20.500.14279/1515
ISSN: 2224266X
Rights: © WSEAS
Attribution-NonCommercial-NoDerivs 3.0 United States
Type: Article
Affiliation: University of Patras 
Affiliation : University of Patras 
Publication Type: Peer Reviewed
Appears in Collections:Άρθρα/Articles

CORE Recommender
Show full item record

Page view(s) 50

362
Last Week
1
Last month
3
checked on Dec 22, 2024

Google ScholarTM

Check


This item is licensed under a Creative Commons License Creative Commons