Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms

Abstract

Embedded devices are ubiquitously involved in a large variety of security applications which heavily rely on the computation of hash functions. Roughly, two alternatives for speeding up computations co-exist in these resource constrained devices: parallel processing and hardware acceleration. Needles to say, multi-core devices are clearly the next step in… (More)
DOI: 10.4018/ijsse.2013100101

Topics

Cite this paper

@article{Murvay2013PerformanceEO, title={Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms}, author={Pal-Stefan Murvay and Bogdan Groza}, journal={IJSSE}, year={2013}, volume={4}, pages={1-24} }