Back to Results
First PageMeta Content
SHA-2 / SHA-1 / HMAC / Crypto++ / Crypt / NIST hash function competition / Tiger / HAS-160 / Cryptographic hash functions / Error detection and correction / Cryptography


Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical
Add to Reading List

Open Document

File Size: 190,04 KB

Share Result on Facebook

City

Fairfax / Sciences Institute Arlington / /

Company

Aldec Inc. / Xilinx / the AES / /

/

Facility

University of Southern California / George Mason University / Institute Arlington / University Drive / /

IndustryTerm

deployed security protocols / application developer / reference software implementations / security protocol / reconfigurable hardware / cryptographic algorithms / secret-key encryption algorithm / security protocols / /

OperatingSystem

Linux / /

Organization

National Security Agency / University of Southern California / George Mason University / /

Person

PC D CSA / CSA CSA CSA / LUT SHIFT / /

Position

ft ROTL30 H0 CPA / CPA / H3 CPA / R2 R1 CPA / PreProcessor Wt Message Scheduler / H2 CPA / H2 H2 CPA / H1 CPA / scheduler / H1 H1 CPA / H6 CPA / H7 CPA / H5 CPA / H4 CPA / /

Product

Design Methodology Our / SLAAC-1V / /

ProvinceOrState

Virginia / Southern California / /

Region

Southern California / /

Technology

encryption / FPGA / IP security protocol / Linux / same technology / accelerator board / 80-bit secret-key encryption algorithm / security protocols / simulation / digital signature / SSL / VHDL / deployed security protocols / performed using the SLAAC-1V hardware accelerator board / /

SocialTag