Logically Grouped Reduced-set Implementation of SHA3-256
on FPGA
Keywords: SHA-3, Keccak, Cryptographic Hash Function, FPGA
Mehran University Research Journal of Engineering & Technology
Volume 29 , Issue 4
DUR-E-SHAHWAR KUNDI , ARSHAD Aziz , ,
References
1. |
Liang, J., and Lai, X.J., “Improved Collision Attack on
Hash Function MD5â€, Journal of Computer Science and
Technology, Volume 22, pp. 79-87, 2007 |
2. |
Wang, X., Yin, Y., and Yu, H., “Finding Collisions in the
Full SHA-1â€, Advances in Cryptology CRYPTO, Lecture
Notes in Computer Science, Volume 3621, pp. 17-36,
Springer Berlin Heidelberg, 2005. |
3. |
Wang, X., Feng, D., Lai, X., and Yu, H., “Collisions for
Hash Functions MD4, MD5, HAVAL-128 and RIPEMDâ€,
2004 http://eprint.iacr.org/ |
4. |
Bertoni, G., Daemen, J., Peeters, M., and Assche, G.V.,
“The Keccak SHA-3 Submission Version 3â€, Technical
Report, 2011 |
5. |
NIST (National Institute of Standards & Technology),
“NIST Selects Winner of Secure Hash Algorithm
(SHA-3) Competitionâ€, 2012. |
|
|
|