A case against currently used hash functions in RFID protocols

M Feldhofer, C Rechberger - … International Conferences" On the Move to …, 2006 - Springer
Designers of RFID security protocols can choose between a wide variety of cryptographic
algorithms. However, when implementing these algorithms on RFID tags fierce constraints …

Optimisation of the SHA-2 family of hash functions on FPGAs

RP McEvoy, FM Crowe, CC Murphy… - … on Emerging VLSI …, 2006 - ieeexplore.ieee.org
Hash functions play an important role in modern cryptography. This paper investigates
optimisation techniques that have recently been proposed in the literature. A new VLSI …

Improving SHA-2 hardware implementations

R Chaves, G Kuzmanov, L Sousa… - … Hardware and Embedded …, 2006 - Springer
This paper proposes a set of new techniques to improve the implementation of the SHA-2
hashing algorithm. These techniques consist mostly in operation rescheduling and …

Design of a novel asynchronous reconfigurable architecture for cryptographic applications

K Sun, X Pan, J Wang, J Wang - First International Multi …, 2006 - ieeexplore.ieee.org
Cryptographic algorithms are usually compute-intensive and more efficiently implemented in
hardware than in software running on general-purpose processors. However, systems which …

Design of a reconfigurable cryptographic engine

K Sun, L Ping, J Wang, Z Liu, X Pan - Advances in Computer Systems …, 2006 - Springer
Cryptographic algorithms are usually compute-intensive and more efficiently implemented in
hardware than in software. By taking advantage of FPGA technology, some work offers high …

Efficient FPGA implementation of novel cryptographic hashing core

H Michail, A Kakarountas, A Milidonis, C Goutis - Computing Letters, 2006 - brill.com
Hash functions are utilized in the security layer of every communication protocol and in
signature authentication schemes for electronic transactions. As time passes more …