메뉴 건너뛰기




Volumn 16, Issue 8, 2008, Pages 999-1008

Cost-efficient SHA hardware accelerators

Author keywords

Crytography; Field programmable gate array (FPGA); Hardware implementation; Hash functions; Secure Hash Algorithm (SHA)

Indexed keywords

FUNCTIONS;

EID: 48349138632     PISSN: 10638210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVLSI.2008.2000450     Document Type: Article
Times cited : (55)

References (25)
  • 1
    • 48349094388 scopus 로고    scopus 로고
    • V. Klima, Finding MD5 collisions - A toy for a notebook. Cryptology ePrint Archive, 2005/075, 2005.
    • V. Klima, "Finding MD5 collisions - A toy for a notebook." Cryptology ePrint Archive, 2005/075, 2005.
  • 2
    • 33745171465 scopus 로고    scopus 로고
    • X. Wang, Y. L. Yin, and H. Yu, Finding collisions in the full SHA-1, in CRYPTO, V. Shoup, Ed. New York: Springer, 2005, 3621, Lecture Notes in Computer Science, pp. 17-36.
    • X. Wang, Y. L. Yin, and H. Yu, "Finding collisions in the full SHA-1," in CRYPTO, V. Shoup, Ed. New York: Springer, 2005, vol. 3621, Lecture Notes in Computer Science, pp. 17-36.
  • 3
    • 4043135942 scopus 로고    scopus 로고
    • National Institute of Standards and Technology NIST, MD
    • National Institute of Standards and Technology (NIST), MD, "FIPS 180-2, secure hash standard (SHS)," 2002.
    • (2002) FIPS 180-2, secure hash standard (SHS)
  • 4
    • 3042615299 scopus 로고    scopus 로고
    • The design of a high speed ASIC unit for the hash function SHA-256 (384, 512)
    • L. Dadda, M. Macchetti, and J. Owen, "The design of a high speed ASIC unit for the hash function SHA-256 (384, 512)," in Proc. DATE, 2004, pp. 70-75.
    • (2004) Proc. DATE , pp. 70-75
    • Dadda, L.1    Macchetti, M.2    Owen, J.3
  • 6
    • 2942671000 scopus 로고    scopus 로고
    • An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512)
    • L. Dadda, M. Macchetti, and J. Owen, D. Garrett, J. Lach, and C. A. Zukowski, Eds
    • L. Dadda, M. Macchetti, and J. Owen, D. Garrett, J. Lach, and C. A. Zukowski, Eds., "An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512)," in Proc. ACM Great Lakes Symp. VLSI, 2004, pp. 421-425.
    • (2004) Proc. ACM Great Lakes Symp. VLSI , pp. 421-425
  • 7
    • 84945300922 scopus 로고    scopus 로고
    • Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512
    • ISC, A. H. Chan and V. D. Gligor, Eds. New York: Springer
    • T. Grembowski, R. Lien, K. Gaj, N. Nguyen, P. Bellows, J. Flidr, T. Lehman, and B. Schott, "Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512," in ISC, A. H. Chan and V. D. Gligor, Eds. New York: Springer, 2002, vol. 2433, Lecture Notes in Computer Science, pp. 75-89.
    • (2002) Lecture Notes in Computer Science , vol.2433 , pp. 75-89
    • Grembowski, T.1    Lien, R.2    Gaj, K.3    Nguyen, N.4    Bellows, P.5    Flidr, J.6    Lehman, T.7    Schott, B.8
  • 9
    • 15544371957 scopus 로고    scopus 로고
    • Implementation of the SHA-2 hash family standard using FPGAs
    • N. Sklavos and O. Koufopavlou, "Implementation of the SHA-2 hash family standard using FPGAs," J. Supercomput., vol. 31, pp. 227-248, 2005.
    • (2005) J. Supercomput , vol.31 , pp. 227-248
    • Sklavos, N.1    Koufopavlou, O.2
  • 10
    • 79955162305 scopus 로고    scopus 로고
    • K. K. Ting, S. C. L. Yuen, K.-H. Lee, and P. H. W. Leong, An FPGA based SHA-256 processor, in FPL, M. Glesner, P. Zipf, and M. Renovell, Eds. New York: Springer, 2002, 2438, Lecture Notes in Computer Science, pp. 577-585.
    • K. K. Ting, S. C. L. Yuen, K.-H. Lee, and P. H. W. Leong, "An FPGA based SHA-256 processor," in FPL, M. Glesner, P. Zipf, and M. Renovell, Eds. New York: Springer, 2002, vol. 2438, Lecture Notes in Computer Science, pp. 577-585.
  • 11
    • 35048818496 scopus 로고    scopus 로고
    • A 1 Gbit/s partially unrolled architecture of hash functions SHA-1 and SHA-512
    • R. Lien, T. Grembowski, and K. Gaj, "A 1 Gbit/s partially unrolled architecture of hash functions SHA-1 and SHA-512," in Proc. CT-RSA, 2004, pp. 324-338.
    • (2004) Proc. CT-RSA , pp. 324-338
    • Lien, R.1    Grembowski, T.2    Gaj, K.3
  • 12
    • 15744365992 scopus 로고    scopus 로고
    • Networking data integrity: High speed architectures and hardware implementations
    • N. Sklavos, E. Alexopoulos, and O. G. Koufopavlou, "Networking data integrity: High speed architectures and hardware implementations," Int. Arab J. Inf. Technol., vol. 1, pp. 54-59, 2003.
    • (2003) Int. Arab J. Inf. Technol , vol.1 , pp. 54-59
    • Sklavos, N.1    Alexopoulos, E.2    Koufopavlou, O.G.3
  • 14
    • 33646401086 scopus 로고    scopus 로고
    • H. E. Michail, A. P. Kakarountas, G. N. Selimis, and C. E. Goutis, Optimizing SHA-1 hash function for high throughput with a partial unrolling study, in PATMOS, V. Paliouras, J. Vounckx, and D. Verkest, Eds. New York: Springer, 2005, 3728, Lecture Notes in Computer Science, pp. 591-600.
    • H. E. Michail, A. P. Kakarountas, G. N. Selimis, and C. E. Goutis, "Optimizing SHA-1 hash function for high throughput with a partial unrolling study," in PATMOS, V. Paliouras, J. Vounckx, and D. Verkest, Eds. New York: Springer, 2005, vol. 3728, Lecture Notes in Computer Science, pp. 591-600.
  • 18
    • 48349123571 scopus 로고
    • National Institute of Standards and Technology NIST, MD, FIPS 180
    • National Institute of Standards and Technology (NIST), MD, "Announcing the standard for secure hash standard," FIPS 180, 1993.
    • (1993) Announcing the standard for secure hash standard
  • 19
    • 60949097636 scopus 로고    scopus 로고
    • National Institute of Standards and Technology NIST
    • National Institute of Standards and Technology (NIST), "The keyedhash message authentication code (HMAC)," FIPS 198, 2002.
    • The keyedhash message authentication code (HMAC) , vol.FIPS 198 , pp. 2002
  • 20
    • 48349087129 scopus 로고    scopus 로고
    • Woodcliff Lake, NJ
    • CAST, Online, Available
    • CAST, Woodcliff Lake, NJ, "SHA-1 secure hash algorithm, cryptoprocessor core," 2005 [Online]. Available: http://http://www.cast- inc.com/
    • (2005) SHA-1 secure hash algorithm, cryptoprocessor core


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.