Hardware Evaluation of SHA-3 Candidates

  title={Hardware Evaluation of SHA-3 Candidates},
  author={Sinan Huang},
(Abstract) Cryptographic hash functions are used extensively in information security, most notably in digital authentication and data integrity verification. Their performance is an important factor of the overall performance of a secure system. In 2005, some groups of cryptanalysts were making increasingly successful attacks and exploits on the cryptographic hash function, SHA-1, the most widely used hash function of the secure hashing algorithm family. Although these attacks do not work on… CONTINUE READING
Highly Cited
This paper has 18 citations. REVIEW CITATIONS


Publications referenced by this paper.
Showing 1-10 of 12 references

Groestl – a SHA-3 candidate

P. Gauravaram
View 10 Excerpts
Highly Influenced

ATHENa - Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware Using FPGAs

2010 International Conference on Field Programmable Logic and Applications • 2010
View 4 Excerpts
Highly Influenced

A Prototyping Platform for Performance Evaluation of SHA-3 Candidates

K. Kobayashi
Proceedings of HOST2010, • 2010
View 1 Excerpt

Comprehensive Comparison of Hardware Performance of Fourteen Round 2 SHA-3 Candidates with 512-bit Outputs Using Field Programmable Gate Arrays

K. Gaj
NIST 2nd SHA-3 Candidate Conference, • 2010
View 1 Excerpt

FPGA Implementations of the Round Two SHA-3 Candidates

B. Baldwin
NIST 2nd SHA-3 Candidate Conference, • 2010
View 1 Excerpt

Fair and comprehensive methodology fir comparing hardware performance for fourteen round two SHA-3 candidates using FPGA

Proceedings of CHES2010, • 2010
View 2 Excerpts

Hash Functions

W. Stalling
Cryptography and Network Security Principles and Practices, Prentice Hall, pp 334-338, 2009 • 2009
View 1 Excerpt

A Hardware Interface for Hashing Algorithms

IACR Cryptology ePrint Archive • 2008
View 2 Excerpts