The U.S. National Institute of Standards and Technology encouraged the publication of works that investigate and evaluate the performances of the second round SHA-3 candidates. Besides the hardware characterization of the 14 candidate algorithms, the main goal of this paper is the description of a reliable methodology to efficiently characterize and compare VLSI circuits of cryptographic primitives. We took the opportunity to apply it on the ongoing SHA-3 competition. To this end, we implemented several architectures in a 90 nm CMOS technology, targeting high- and moderate-speed constraints separately. Thanks to this analysis, we were able to present a complete benchmark of the achieved post-layout results of the circuits. © 2010 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Henzen, L., Gendotti, P., Guillet, P., Pargaetzi, E., Zoller, M., & Gürkaynak, F. K. (2010). Developing a hardware evaluation method for SHA-3 candidates. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6225 LNCS, pp. 248–263). Springer Verlag. https://doi.org/10.1007/978-3-642-15031-9_17
Mendeley helps you to discover research relevant for your work.