This paper proposes a hardware solution for the SHA-256 hash function offering a number of configurable architecture-level features. This flexibility allows for exploring various trade-offs between performance, area occupation, and power consumption. As confirmed by the experimental results, the approach succeeds in exposing the effects of different architectural configurations on the resulting implementation.
CITATION STYLE
Martino, R., & Cilardo, A. (2020). A Configurable Implementation of the SHA-256 Hash Function. In Lecture Notes in Networks and Systems (Vol. 96, pp. 558–567). Springer. https://doi.org/10.1007/978-3-030-33509-0_52
Mendeley helps you to discover research relevant for your work.