Low area FPGA and ASIC implementations of the hash function “Blue Midnight Wish-256”

@article{ElHadedy2009LowAF,
  title={Low area FPGA and ASIC implementations of the hash function “Blue Midnight Wish-256”},
  author={Mohamed El-Hadedy and Danilo Gligoroski and Svein J. Knapskog and Einar J. Aas},
  journal={2009 International Conference on Computer Engineering & Systems},
  year={2009},
  pages={10-14}
}
Hash functions are widely used in information security and cryptography. They are used in countless applications such as message authentication codes (MAC), Digital Signatures (DS) and mobile trusted modules (MTM). Serious attacks have been reported against cryptographic hash algorithms, including SHA-1. Because the SHA-1 and SHA-2 families share a similar design, the National Institute of Standards and Technology (NIST) in 2007 decided to start a world-wide development process for choosing the… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-9 OF 9 REFERENCES

FPGA implementations of SHA-3 Candidates: Cube Hash, Grøstl, Lan, Shabal and Spectral Hash”, “http://eprint.iacr.org/2009/342.pdf

  • B. Baldwin, A.Byrne, +4 authors W. P. Marnane
  • 2009
1 Excerpt

Reconfigurable Implementation of the New Secure Hash Algorithm

  • M.Zeghid, B.Bouallegue, A.Baganne, M.Machhout, R.Tourki
  • In proceedings of the International Conference on…
  • 2007
1 Excerpt

Design Vision User Guide Tutorial

  • Synopsys
  • www2.informatik.uni-jena.de/~ct_mgr/a1/pdf/dvug…
1 Excerpt

Model Sim PE / PLUS User ’ s Manual . Model technology , 2008 [ 8 ] Xilinx , “ Device Package User Guide ”

  • O. Koufopavlou Sklavos

“ Cryptanalysis on SHA - 1 ”

  • X. Wang, A. C. Yao, F. Yao

Similar Papers

Loading similar papers…