Implementation of the SHA-2 Hash Family Standard Using FPGAs
The Journal of Supercomputing
Finding collisions in the full SHA-1
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Hi-index | 0.00 |
In this paper an efficient implementation, in terms of performance, of the keyed-hash message authentication code (HMAC) using the SHA-256 hash function is presented. This mechanism is used for message authentication in combination with a shared secret key. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throughput and low-power implementation for the whole HMAC construction. Special care has been taken so that the proposed implementation doesn't introduce extra design complexity; while in parallel functionality was kept to the required levels.