Article Information  
Logically Grouped Reduced-set Implementation of SHA3-256 on FPGA

Keywords: SHA-3, Keccak, Cryptographic Hash Function, FPGA

Mehran University Research Journal of Engineering & Technology

Volume 29 ,  Issue 4


1. Liang, J., and Lai, X.J., “Improved Collision Attack on Hash Function MD5”, Journal of Computer Science and Technology, Volume 22, pp. 79-87, 2007
2. Wang, X., Yin, Y., and Yu, H., “Finding Collisions in the Full SHA-1”, Advances in Cryptology CRYPTO, Lecture Notes in Computer Science, Volume 3621, pp. 17-36, Springer Berlin Heidelberg, 2005.
3. Wang, X., Feng, D., Lai, X., and Yu, H., “Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD”, 2004
4. Bertoni, G., Daemen, J., Peeters, M., and Assche, G.V., “The Keccak SHA-3 Submission Version 3”, Technical Report, 2011
5. NIST (National Institute of Standards & Technology), “NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition”, 2012.