Show simple item record

dc.contributor.authorKakarountas, Athanasios P.
dc.contributor.authorTheodoridis, Georgios
dc.contributor.authorLaopoulos, T.
dc.contributor.authorGoutis, Costas E.
dc.date.accessioned2015-07-25T09:19:38Z
dc.date.available2015-07-25T09:19:38Z
dc.date.issued2005-09
dc.identifier.isbn0-7803-9445-3
dc.identifier.isbn0-7803-9446-1 (online)
dc.identifier.otherDOI: 10.1109/IDAACS.2005.282972
dc.identifier.urihttp://hdl.handle.net/123456789/998
dc.description.abstractThe main applications of the Hash functions lie in the fields of communication integrity and authentication. In every communication protocol, especially in mobile protocols, a Hash function is employed in the security layer. However, as communication protocols evolve and new high-performance applications appear, the throughput of hash functions seems to reach to a limit. Especially the SHA-1 Hash function, which is common in the majority of the wireless protocols (WAP etc.), was limited to a maximum throughput of 2 Gbps. In this paper, a new implementation is introduced to exceed this limit improving the throughput by 37% without significant area penalty.el
dc.language.isoenel
dc.publisherIEEEel
dc.relation.ispartofseriesIntelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2005. IDAACS 2005. IEEE;pp. 211 - 215
dc.subjectcryptographyel
dc.subjectfield programmable gate arraysel
dc.subjectmobile radioel
dc.subjecttelecommunication securityel
dc.subjectData integrity and authenticationel
dc.subjectFPGA implementationel
dc.subjectHash functionel
dc.subjectVLSI Designel
dc.titleA High- Speed FPGA Implementation of the SHA-1 Hash Functionel
dc.typeArticleel


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record