Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications
By: Muzaffar Rao, Thomas Newe and Ian Grout
References
- Xiaoyun Wang, X.L., Feng, D., Yu, H.: Collisions for hash functions MD4, MD5,HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199, pp. 1–4 (2004),
http://eprint.iacr.org/2004/199 - Szydlo, M.: SHA-1 collisions can be found in 263 operations. Crypto BytesTechnical Newsletter (2005)
- Stevens, M.: Fast collision attack on MD5. ePrint-2006-104, pp. 1–13 (2006),
http://eprint.iacr.org/2006/104.pdf - Federal Register / Vol. 72, No. 212 / Friday, November 2 (2007), Notices,
http://csrc.nist.gov/groups/ST/hash/documents/FR_Notice_Nov07.pdf - National Institute of Standards and Technology (NIST).SHA-3 Winner announcement,
http://www.nis.gov/itl/csd/sha-100212.cfm - F. Henriquez, N. Saqib, D. Prez, and C. Kaya Koc; “Cryptographic Algorithms on Reconfigurable Hardware” Springer, November 2006.
- Kuon, I.; Tessier, R.; Rose, J. FPGA Architecture: Survey and Challenges. Found. Trends Electron. Des. Autom. 2007, 2, 135–253.
- Xilinx 7 Series Overview; Datasheet DS180; Xilinx. Available online:
http://www.xilinx.Com/support/documentation/datasheets/ds1807SeriesOverview.pdf . - G. Bertoni, J. Daemen, M. Peeters, G. Assche “The Keccak SHA-3 Submission version 3” pp. 1-14, (2011),
http://Keccak.noekeon.org/Keccak–reference-3.0.pdf - “XPower Tutorial FPGA Design”, [online]. Available at:
http.xilinx.com/pub/documentation/tutorials/xpowerfpgatutorial.pdf
DOI: https://doi.org/10.21307/ijssis-2019-018 | Journal eISSN: 1178-5608
Language: English
Page range: 1 - 6
Published on: Feb 15, 2020
Published by: Macquarie University, Australia
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year
Keywords:
Related subjects:
© 2020 Muzaffar Rao, Thomas Newe, Ian Grout, published by Macquarie University, Australia
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.