Publication | Closed Access
Exploiting Parallelism on Keccak: FPGA and GPU Comparison
17
Citations
3
References
2013
Year
Unknown Venue
Cryptographic PrimitiveEngineeringHardware AlgorithmComputer ArchitectureGpu ComparisonFormal VerificationGpu ComputingHardware SecurityCompute KernelSystems EngineeringSecure ComputingParallel ComputingPerceptual HashingFinalist AlgorithmsComputer EngineeringHash FunctionComputer ScienceData SecurityCryptographyInformation IntegrityGpu ArchitecturePipeline ImplementationParallel ProgrammingSystem Software
One of the methods to ensure information integrity is the use of hash functions, which generates a stream of bytes (hash) which must be unique. But most functions can no longer prevent malicious attacks and ensure that the information have just a hash. In order to solve this problem, the National Institute of S tandards and Technology (NIS T) convened the scientific community through a competition to create a new hash function standard, called S HA-3. This work is proposed to explore one of the finalist algorithms in the competition, the Keccak, and subsequently implement the propose pipeline architecture in FPGA with intuit to obtain performance data. Finally, it will be compared the pipeline implementation of keccak with implementations on GPUs.
| Year | Citations | |
|---|---|---|
Page 1
Page 1