Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο: https://hdl.handle.net/20.500.14279/9817
Πεδίο DCΤιμήΓλώσσα
dc.contributor.authorAthanasiou, George S.-
dc.contributor.authorMichail, Harris-
dc.contributor.authorTheodoridis, G.-
dc.contributor.authorGoutis, Costas E.-
dc.date.accessioned2017-02-20T12:43:10Z-
dc.date.available2017-02-20T12:43:10Z-
dc.date.issued2013-01-
dc.identifier.citationIET Computers and Digital Techniques, 2013, vol. 7, no. 1, pp. 29-40en_US
dc.identifier.issn1751861X-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/9817-
dc.description.abstractHash functions are included in almost all cryptographic schemes and security protocols for providing authentication services. JH is a new hash function, introduced in 2008 and it is among the five finalists of the international competition for developing the new hash standard SHA-3. In this study, one non-pipelined and four pipelined architectures are introduced for developing high-performance field-programmable gate array (FPGA) designs of the JH function. Special effort has been paid and various design alternatives have been studied to derive efficient FPGA implementations in terms of frequency, area and throughput/ area cost factor. Compared with the best existing non-pipelined FPGA implementations, the throughput/area is improved by 48, 13.5 and 17.8% in Xilinx Virtex-4, Virtex-5 and Virtex-6 families, respectively, and by 6.8 and 21.2% in ALTERA Stratix-III and Stratix-IV, respectively. Also, the improvements of the throughput/area factor of the introduced pipelined architectures over the existing ones are 37.5, 73.1, 15 and 26.3% in Virtex-5, Virtex-6, Stratix-III and Stratix-IV technologies, respectively.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.relation.ispartofIET Computers and Digital Techniquesen_US
dc.rights© The Institution of Engineering and Technologyen_US
dc.subjectSHA-1en_US
dc.subjectHash Functionen_US
dc.subjectAuthenticated Encryptionen_US
dc.titleHigh-performance FPGA implementations of the cryptographic hash function JHen_US
dc.typeArticleen_US
dc.collaborationUniversity of Patrasen_US
dc.collaborationCyprus University of Technologyen_US
dc.subject.categoryComputer and Information Sciencesen_US
dc.journalsSubscriptionen_US
dc.countryGreeceen_US
dc.countryCyprusen_US
dc.subject.fieldNatural Sciencesen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.1049/iet-cdt.2012.0070en_US
dc.relation.issue1en_US
dc.relation.volume7en_US
cut.common.academicyear2012-2013en_US
dc.identifier.spage29en_US
dc.identifier.epage40en_US
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.cerifentitytypePublications-
item.openairetypearticle-
crisitem.journal.journalissn1751-861X-
crisitem.journal.publisherThe Institution of Engineering and Technology-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
Εμφανίζεται στις συλλογές:Άρθρα/Articles
CORE Recommender
Δείξε τη σύντομη περιγραφή του τεκμηρίου

SCOPUSTM   
Citations

1
checked on 9 Νοε 2023

WEB OF SCIENCETM
Citations 20

1
Last Week
0
Last month
0
checked on 1 Νοε 2023

Page view(s)

448
Last Week
1
Last month
33
checked on 14 Μαρ 2025

Google ScholarTM

Check

Altmetric


Όλα τα τεκμήρια του δικτυακού τόπου προστατεύονται από πνευματικά δικαιώματα