Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII

@article{Kobayashi2010EvaluationOH,
  title={Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII},
  author={Kazuyuki Kobayashi and Jun Ikegami and Shin'ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta},
  journal={IACR Cryptology ePrint Archive},
  year={2010},
  volume={2010},
  pages={10}
}
As a result of extensive analyses on cryptographic hash functions, NIST started an open competition for selecting a new standard hash function SHA-3. One important aspect of this competition is in evaluating hardware implementations and in collecting much attention of researchers in this area. For a fair comparison of the hardware performance, we propose an evaluation platform, a hardware design strategy, and evaluation criteria that must be consistent for all SHA-3 candidates. First, we define… CONTINUE READING
Highly Cited
This paper has 40 citations. REVIEW CITATIONS