Novel high throughput implementation of SHA-256 hash function through pre-computation technique


Hash functions are utilized in the security layer of every communication protocol and in signature authentication schemes for electronic transactions. As time passes more sophisticated applications-that invoke a security layer-arise and address to more users-clients. This means that all these applications demand for higher throughput. In this work a pre… (More)
DOI: 10.1109/ICECS.2005.4633433


4 Figures and Tables