Lightweight Implementations of SHA-3 Candidates on FPGAs
暂无分享,去创建一个
John Pham | Jens-Peter Kaps | Smriti Gurung | Bilal Habib | Panasayya Yalla | Kishore Kumar Surapathi | Susheel Vadlamudi
[1] Nancy Grand-Est. A Low-Area yet Performant FPGA Implementation of Shabal , 2010 .
[2] John Kelsey,et al. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition , 2011 .
[3] E. Biham,et al. The SHAvite-3 Hash Function , 2008 .
[4] Kazuo Ohta,et al. Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII , 2010, IACR Cryptol. ePrint Arch..
[5] M. Anwar Hasan,et al. Implementation of the compression function for selected SHA-3 candidates on FPGA , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW).
[6] Steven Trimberger,et al. A 90-nm Low-Power FPGA for Battery-Powered Applications , 2006, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[7] Eiji Okamoto,et al. Compact implementations of BLAKE-32 and BLAKE-64 on FPGA , 2010, 2010 International Conference on Field-Programmable Technology.
[8] A. H. Namin,et al. Hardware Implementation of the Compression Function for Selected SHA-3 Candidates , 2009 .
[9] Patrick Schaumont,et al. A Hardware Interface for Hashing Algorithms , 2008, IACR Cryptol. ePrint Arch..
[10] François Durvaux,et al. Compact FPGA Implementations of the Five SHA-3 Finalists , 2011, CARDIS.
[11] Çetin Kaya Koç,et al. About Cryptographic Engineering , 2008, Cryptographic Engineering.
[12] Hongjun Wu,et al. The Hash Function JH , 2009 .
[13] Mohamed El-Hadedy,et al. Cryptographic hash function Blue Midnight Wish , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.
[14] Florian Mendel,et al. Symmetric Cryptography , 2009 .
[15] Stefan Lucks,et al. The Skein Hash Function Family , 2009 .
[16] Tsuyoshi Takagi,et al. Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings , 2011, CHES.
[17] Olivier Billet , .
[18] Kris Gaj,et al. ATHENa - Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware Using FPGAs , 2010, 2010 International Conference on Field Programmable Logic and Applications.
[19] Kris Gaj,et al. Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs , 2010, CHES.
[20] A. Civit-Balcells,et al. ROM-Based Finite State Machine Implementation in Low Cost FPGAs , 2007, 2007 IEEE International Symposium on Industrial Electronics.
[21] Kris Gaj,et al. Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates Implemented Using Xilinx and Altera FPGAs , 2011, CHES.
[22] Mariusz Rawski,et al. An application of functional decomposition in ROM-based FSM implementation in FPGA devices , 2005, J. Syst. Archit..
[23] Stefan Mangard,et al. Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010, CHES.
[24] Guido Bertoni,et al. Keccak sponge function family main document , 2009 .
[25] Willi Meier,et al. SHA-3 proposal BLAKE , 2009 .
[26] Steffen Reith,et al. On FPGA-based implementations of Gröstl , 2010, IACR Cryptol. ePrint Arch..
[27] P. Schaumont,et al. How Can We Conduct " Fair and Consistent " Hardware Evaluation for SHA-3 Candidate ? , 2010 .
[28] Valery Skylarov. Synthesis and Implementation of RAM-Based Finite State Machines in FPGAs , 2000 .
[29] William P. Marnane,et al. FPGA Implementations of the Round Two SHA-3 Candidates , 2010, 2010 International Conference on Field Programmable Logic and Applications.
[30] Kris Gaj,et al. FPGA and ASIC Implementations of AES , 2009, Cryptographic Engineering.