Sciweavers

13 search results - page 1 / 3
» FPGA Implementations of the Round Two SHA-3 Candidates
Sort
View
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 9 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
14 years 9 days ago
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an e...
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
ISW
2009
Springer
14 years 5 months ago
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as ...
Mario Lamberger, Florian Mendel
ASAP
2009
IEEE
159views Hardware» more  ASAP 2009»
14 years 6 months ago
A High-Performance Hardware Architecture for Spectral Hash Algorithm
—The Spectral Hash algorithm is one of the Round 1 candidates for the SHA-3 family, and is based on spectral arithmetic over a finite field, involving multidimensional discrete...
Ray C. C. Cheung, Çetin K. Koç, John...