Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/1602
Title: A top-down design methodology for ultrahigh-performance hashing cores
Authors: Michail, Harris 
Kakarountas, Athanasios P. 
Milidonis, Athanasios S. 
Goutis, Costas E. 
Major Field of Science: Engineering and Technology
Field Category: Electrical Engineering - Electronic Engineering - Information Engineering
Keywords: Integrity;Authentication;Cryptography;Hardware
Issue Date: Oct-2009
Source: IEEE Transactions on Dependable and Secure Computing, 2009, vol. 6, no. 4, pp. 255-268
Volume: 6
Issue: 4
Start page: 255
End page: 268
Journal: IEEE Transactions on Dependable and Secure Computing 
Abstract: Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec, and VPNs utilize hash functions, which form a special family of cryptographic algorithms. Applications that use these security schemes are becoming very popular as time goes by and this means that some of these applications call for higher throughput either due to their rapid acceptance by the market or due to their nature. In this work, a new methodology is presented for achieving high operating frequency and throughput for the implementations of all widely usedand those expected to be used in the near futurehash functions such as MD-5, SHA-1, RIPEMD (all versions), SHA-256, SHA-384, SHA-512, and so forth. In the proposed methodology, five different techniques have been developed and combined with the finest way so as to achieve the maximum performance. Compared to conventional pipelined implementations of hash functions (in FPGAs), the proposed methodology can lead even to a 160 percent throughput increase.
URI: https://hdl.handle.net/20.500.14279/1602
ISSN: 19410018
DOI: 10.1109/TDSC.2008.15
Rights: © IEEE
Type: Article
Affiliation: University of Patras 
Affiliation : University of Patras 
Publication Type: Peer Reviewed
Appears in Collections:Άρθρα/Articles

CORE Recommender
Show full item record

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.