Sciweavers

188 search results - page 1 / 38
» Developing a Hardware Evaluation Method for SHA-3 Candidates
Sort
View
CHES
2010
Springer
182views Cryptology» more  CHES 2010»
13 years 11 months ago
Developing a Hardware Evaluation Method for SHA-3 Candidates
Luca Henzen, Pietro Gendotti, Patrice Guillet, Enr...
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
13 years 12 months ago
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an e...
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 8 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
FSE
2011
Springer
263views Cryptology» more  FSE 2011»
13 years 2 months ago
Practical Near-Collisions on the Compression Function of BMW
Abstract. Blue Midnight Wish (BMW) is one of the fastest SHA-3 candidates in the second round of the competition. In this paper we study the compression function of BMW and we obta...
Gaëtan Leurent, Søren S. Thomsen
DATE
2006
IEEE
88views Hardware» more  DATE 2006»
14 years 4 months ago
Timing-reasoning-based delay fault diagnosis
In this paper, we propose a timing-reasoning algorithm to improve the resolution of delay fault diagnosis. In contrast to previous approaches which identify candidates by utilizin...
Kai Yang, Kwang-Ting Cheng