Efficient FPGA implementation of secure hash algorithm Grøstl-SHA-3 finalist

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cryptographic hash functions are used for digital signatures; message authentication codes (MACs) and other forms of authentication. National Institute of Standards and Technology (NIST) announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. Hardware performance evaluation of the candidates of this competition is a vital part of this contest. In this work we present an efficient FPGA implementation of Grøstl, one of the final round candidates of SHA-3. We show our results in the form of chip area consumption, throughput and throughput per area. We compare and contrast these results with other reported implementations of Grøstl. Our design ranks highest in terms of throughput per area, achieving figures of 5.47 Mbps/slice on Virtex 7 and 5.12 Mbps/slice for Grøstl-256 on Virtex 6. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Rao, M. M., Latif, K., Aziz, A., & Mahboob, A. (2012). Efficient FPGA implementation of secure hash algorithm Grøstl-SHA-3 finalist. In Communications in Computer and Information Science (Vol. 281 CCIS, pp. 361–372). https://doi.org/10.1007/978-3-642-28962-0_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free