Hardware Performance Evaluation of SHA-3 Candidate Algorithms

Download Now
Provided by: Dalhousie University
Topic: Security
Format: PDF
Secure Hashing Algorithms (SHA) showed a significant importance in today's information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace SHA1 and SHA2 with the new SHA-3, to ensure long term robustness of hash functions. In this paper, the authors present a comprehensive hardware evaluation for the final round SHA-3 candidates. The main goal of providing the hardware evaluation is to: find the best algorithm among them that will satisfy the new hashing algorithm standards defined by the NIST.
Download Now

Find By Topic