ASIC implementations of five SHA-3 finalists

@article{Guo2012ASICIO,
  title={ASIC implementations of five SHA-3 finalists},
  author={Xu Guo and Meeta Srivastav and Sinan Huang and Dinesh Ganta and Michael B. Henry and Leyla Nazhandali and Patrick Schaumont},
  journal={2012 Design, Automation & Test in Europe Conference & Exhibition (DATE)},
  year={2012},
  pages={1006-1011}
}
Throughout the NIST SHA-3 competition, in relative order of importance, NIST considered the security, cost, and algorithm and implementation characteristics of a candidate [1]. Within the limited one-year security evaluation period for the five SHA-3 finalists, the cost and performance evaluation may put more weight in the selection of winner. This work contributes to the SHA-3 hardware evaluation by providing timely cost and performance results on the first SHA-3 ASIC in 0.13 μm IBM process… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

Similar Papers

Loading similar papers…