[PDF][PDF] FPGA implementation of an HMAC processor based on the SHA-2 family of hash functions
M Juliato, C Gebotys - University of Waterloo, Tech. Rep, 2011 - Citeseer
The utilization of hash functions and Keyed-Hash Message Authentication Codes (HMAC)
are of utmost importance to ensure data integrity and data origin authentication in digital …
are of utmost importance to ensure data integrity and data origin authentication in digital …
Ultra high throughput implementations for MD5 hash algorithm on FPGA
Y Wang, Q Zhao, L Jiang, Y Shao - … 2009, Shanghai, China, August 10-12 …, 2010 - Springer
This paper first presents a new architecture of MD5, which achieved the theoretical upper
bound on throughput in the iterative architecture. And then based on the general proposed …
bound on throughput in the iterative architecture. And then based on the general proposed …
Optimization of a quantum-secure sponge-based hash message authentication protocol
MK Latif, HS Jacinto, L Daoud… - 2018 IEEE 61st …, 2018 - ieeexplore.ieee.org
Hash message authentication is a fundamental building block of many networking security
protocols such as SSL, TLS, FTP, and even HTTPS. The sponge-based SHA-3 hashing …
protocols such as SSL, TLS, FTP, and even HTTPS. The sponge-based SHA-3 hashing …
Multi-stage pipelining MD5 implementations on FPGA with data forwarding
HA Tuan, K Yamazaki, S Oyanagi - IPSJ Online Transactions, 2009 - jstage.jst.go.jp
The MD5 (Message Digest 5) hash algorithm is useful for verifying the correctness and
integrity of an arbitrary message, but the data dependency in the critical path in its iterations …
integrity of an arbitrary message, but the data dependency in the critical path in its iterations …
Ultra high throughput architectures for SHA-1 hash algorithm on FPGA
L Jiang, Y Wang, Q Zhao, Y Shao… - 2009 International …, 2009 - ieeexplore.ieee.org
This paper first presents a new architecture of SHA-1, which achieved the theoretical upper
bound on throughput in the iterative architecture. And then based on the general proposed …
bound on throughput in the iterative architecture. And then based on the general proposed …
An application layer non-repudiation wireless system: A cross-layer approach
S Adibi - 2010 IEEE International Symposium on" A World of …, 2010 - ieeexplore.ieee.org
Non-repudiation techniques are to ensure any communication taking place between two or
more parties will be undeniable. Therefore it is crucial to include digital signatures of the …
more parties will be undeniable. Therefore it is crucial to include digital signatures of the …
[PDF][PDF] Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design.
Some applications, such as Message Authentication Code (MAC), rely on different hashing
operations. There are various hash functions, including Message-Digest 5 (MD5), RACE …
operations. There are various hash functions, including Message-Digest 5 (MD5), RACE …
Fault Tolerant Cryptographic Primitives for Space Applications
M Juliato - 2011 - uwspace.uwaterloo.ca
Spacecrafts are extensively used by public and private sectors to support a variety of
services. Considering the cost and the strategic importance of these spacecrafts, there has …
services. Considering the cost and the strategic importance of these spacecrafts, there has …
An efficient hmac processor based on the sha-3 hash function
J Li, L Wu, X Zhang - 2017 IEEE 12th International Conference …, 2017 - ieeexplore.ieee.org
The Keyed-Hash Message Authentication Codes (HMAC) is a widely used method to ensure
the integrity and authentication of data. In this paper an FPGA-based efficient processor of …
the integrity and authentication of data. In this paper an FPGA-based efficient processor of …
Implementation of HSSec: a High–Speed Cryptographic Co-Processor
AP Kakarountas, H Michail, CE Goutis… - … IEEE Conference on …, 2007 - ieeexplore.ieee.org
In this paper a high-speed cryptographic coprocessor, named HSSec, is presented. The
core embeds two hash functions, SHA-1 and SHA-512, and the symmetric block cipher AES …
core embeds two hash functions, SHA-1 and SHA-512, and the symmetric block cipher AES …