Throughput/Area Trade-Offs of Loop-Unrolling, Functional and Structural Pipeline for Skein Hash Function

[1]  Kris Gaj,et al.  Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates Implemented Using Xilinx and Altera FPGAs , 2011, CHES.

[2]  Willi Meier,et al.  VLSI Characterization of the Cryptographic Hash Function BLAKE , 2011, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[3]  William P. Marnane,et al.  FPGA Implementations of the Round Two SHA-3 Candidates , 2010, 2010 International Conference on Field Programmable Logic and Applications.

[4]  Angela Orebaugh,et al.  Guide to IPsec VPNs , 2005 .

[5]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[6]  Elaine B. Barker,et al.  The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .

[7]  Stephen A. Thomas,et al.  SSL & TLS Essentials: Securing the Web , 2000 .

[8]  Pete Loshin IPv6: Theory, Protocol, and Practice , 2003 .

[9]  Marcos Sanchez-Elez,et al.  Reconfiguration Strategies for Online Hardware Multitasking in Embedded Systems , 2013, ArXiv.

[10]  Kris Gaj,et al.  Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs , 2010, CHES.

[11]  Stefan Tillich Hardware Implementation of the SHA-3 Candidate Skein , 2009, IACR Cryptol. ePrint Arch..

[12]  M. Anwar Hasan,et al.  Implementation of the compression function for selected SHA-3 candidates on FPGA , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW).

[13]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[14]  Larry Loeb Secure Electronic Transactions Introduction and Technical Reference , 1998 .

[15]  Stefan Lucks,et al.  The Skein Hash Function Family , 2009 .

[16]  Martin Feldhofer,et al.  Uniform Evaluation of Hardware Implementations of the Round-Two SHA-3 Candidates , 2010 .

[17]  Luca Henzen,et al.  Developing a Hardware Evaluation Method for SHA-3 Candidates , 2010, CHES.

[18]  John Pham,et al.  Lightweight Implementations of SHA-3 Candidates on FPGAs , 2011, INDOCRYPT.

[19]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .