Abstract--This paper presents a new set of techniques for hardware implementations of Secure Hash Algorithm (SHA) hash functions. These techniques consist mostly in operation rescheduling and hardware reutilization, therefore, significantly decreasing the
Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Sta