A Configurable Implementation of the SHA-256 Hash Function

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper proposes a hardware solution for the SHA-256 hash function offering a number of configurable architecture-level features. This flexibility allows for exploring various trade-offs between performance, area occupation, and power consumption. As confirmed by the experimental results, the approach succeeds in exposing the effects of different architectural configurations on the resulting implementation.

Cite

CITATION STYLE

APA

Martino, R., & Cilardo, A. (2020). A Configurable Implementation of the SHA-256 Hash Function. In Lecture Notes in Networks and Systems (Vol. 96, pp. 558–567). Springer. https://doi.org/10.1007/978-3-030-33509-0_52

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free