A case against currently used hash functions in RFID protocols
M Feldhofer, C Rechberger - … International Conferences" On the Move to …, 2006 - Springer
Designers of RFID security protocols can choose between a wide variety of cryptographic
algorithms. However, when implementing these algorithms on RFID tags fierce constraints …
algorithms. However, when implementing these algorithms on RFID tags fierce constraints …
Optimisation of the SHA-2 family of hash functions on FPGAs
RP McEvoy, FM Crowe, CC Murphy… - … on Emerging VLSI …, 2006 - ieeexplore.ieee.org
Hash functions play an important role in modern cryptography. This paper investigates
optimisation techniques that have recently been proposed in the literature. A new VLSI …
optimisation techniques that have recently been proposed in the literature. A new VLSI …
Improving SHA-2 hardware implementations
This paper proposes a set of new techniques to improve the implementation of the SHA-2
hashing algorithm. These techniques consist mostly in operation rescheduling and …
hashing algorithm. These techniques consist mostly in operation rescheduling and …
Design of a novel asynchronous reconfigurable architecture for cryptographic applications
K Sun, X Pan, J Wang, J Wang - First International Multi …, 2006 - ieeexplore.ieee.org
Cryptographic algorithms are usually compute-intensive and more efficiently implemented in
hardware than in software running on general-purpose processors. However, systems which …
hardware than in software running on general-purpose processors. However, systems which …
Design of a reconfigurable cryptographic engine
K Sun, L Ping, J Wang, Z Liu, X Pan - Advances in Computer Systems …, 2006 - Springer
Cryptographic algorithms are usually compute-intensive and more efficiently implemented in
hardware than in software. By taking advantage of FPGA technology, some work offers high …
hardware than in software. By taking advantage of FPGA technology, some work offers high …
Efficient FPGA implementation of novel cryptographic hashing core
Hash functions are utilized in the security layer of every communication protocol and in
signature authentication schemes for electronic transactions. As time passes more …
signature authentication schemes for electronic transactions. As time passes more …