Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
by
Dasygenis, Minas
, Sanida, Theodora
, Sideris, Argyrios
in
cryptography
/ fpga
/ hash algorithm
/ hash function
/ keccak hash function
/ nios ii processor
/ sha-3
/ sponge function
2020
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
by
Dasygenis, Minas
, Sanida, Theodora
, Sideris, Argyrios
in
cryptography
/ fpga
/ hash algorithm
/ hash function
/ keccak hash function
/ nios ii processor
/ sha-3
/ sponge function
2020
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
Journal Article
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
2020
Request Book From Autostore
and Choose the Collection Method
Overview
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures. The new standard cryptographic hash function is Secure Hash Algorithm 3 (SHA-3), which is not vulnerable to attacks. The Keccak algorithm is the winner of the NIST competition for the adoption of the new standard SHA-3 hash algorithm. In this work, we present hardware throughput optimization techniques for the SHA-3 algorithm using the Very High Speed Integrated Circuit Hardware Description Language (VHDL) programming language for all output lengths in the Keccak hash function (224, 256, 384 and 512). Our experiments were performed with the Nios II processor on the FPGA Arria 10 GX (10AX115N2P45E1SG). We applied two architectures, one without custom instruction and one with floating point hardware 2. Finally, we compare the results with other existing similar designs and found that the proposed design with floating point 2 optimizes throughput (Gbps) compared to existing FPGA implementations.
Publisher
MDPI AG
Subject
This website uses cookies to ensure you get the best experience on our website.