Secure hash algorithms and the corresponding FPGA optimization techniques

ZA Al-Odat, M Ali, A Abbas, SU Khan - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic hash functions are widely used primitives with a purpose to ensure the
integrity of data. Hash functions are also utilized in conjunction with digital signatures to …

Comparative study of Keccak SHA-3 implementations

A Dolmeta, M Martina, G Masera - Cryptography, 2023 - mdpi.com
This paper conducts an extensive comparative study of state-of-the-art solutions for
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …

A novel hardware architecture for enhancing the keccak hash function in fpga devices

A Sideris, T Sanida, M Dasygenis - Information, 2023 - mdpi.com
Hash functions are an essential mechanism in today's world of information security. It is
common practice to utilize them for storing and verifying passwords, developing pseudo …

High throughput implementation of SHA3 hash algorithm on field programmable gate array (FPGA)

S El Moumni, M Fettach, A Tragha - Microelectronics journal, 2019 - Elsevier
Cryptographic hash function is an essential element in sensitive communications, such as
banking, military and health. It ensures secure communication by checking data integrity …

On efficiency enhancement of SHA-3 for FPGA-based multimodal biometric authentication

MM Sravani, SA Durai - IEEE Transactions on Very Large Scale …, 2022 - ieeexplore.ieee.org
Synchronized padder block and a compact-dynamic round constant (RC) generator to
achieve highly efficient Keccak architecture are proposed in this work. The proposed design …

Compact hardware implementation of a SHA-3 core for wireless body sensor networks

Y Yang, D He, N Kumar, S Zeadally - IEEE Access, 2018 - ieeexplore.ieee.org
One of the most important Internet of Things applications is the wireless body sensor
network (WBSN), which can provide universal health care, disease prevention, and control …

[PDF][PDF] High-performance FPGA implementation of the secure hash algorithm 3 for single and multi-message processing

F Assad, M Fettach, F El Otmani… - International Journal of …, 2022 - academia.edu
The secure hash function has become the default choice for information security, especially
in applications that require data storing or manipulation. Consequently, optimized …

Design and Performance Evaluation of a Novel High-Speed Hardware Architecture for Keccak Crypto Coprocessor

M Sanlı - International Journal of Parallel Programming, 2024 - Springer
The Keccak algorithm plays a significant role in ensuring the security and confidentiality of
data in modern information systems. However, it involves computational complexities that …

An efficient implementation of FPGA based high speed IPSec (AH/ESP) core

M Rao, T Newe, E Omerdic, G Dooly… - … Journal of Internet …, 2018 - inderscienceonline.com
The IPSec is used to secure the IP traffic. The IPSec protocol was designed to fulfil the need
to provide security at the network level, so that all the higher-layer protocols in the OSI model …

[图书][B] A reconfigurable trusted platform module

MD James - 2017 - search.proquest.com
Abstract A Trusted Platform Module (TPM) is a security device included in most modern
desktop and laptop computers. It helps keep the computing environment secure by isolating …