ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS

An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper. The hardware implementations of the hash function SHA-1 for high performance applications were described.

Saved in:
Bibliographic Details
Main Author: E. V. Listopad
Format: Article
Language:Russian
Published: Educational institution «Belarusian State University of Informatics and Radioelectronics» 2019-06-01
Series:Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki
Subjects:
Online Access:https://doklady.bsuir.by/jour/article/view/623
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849398391067377664
author E. V. Listopad
author_facet E. V. Listopad
author_sort E. V. Listopad
collection DOAJ
description An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper. The hardware implementations of the hash function SHA-1 for high performance applications were described.
format Article
id doaj-art-129ede43b5a84059bdb7d7a64337cbbc
institution Kabale University
issn 1729-7648
language Russian
publishDate 2019-06-01
publisher Educational institution «Belarusian State University of Informatics and Radioelectronics»
record_format Article
series Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki
spelling doaj-art-129ede43b5a84059bdb7d7a64337cbbc2025-08-20T03:38:38ZrusEducational institution «Belarusian State University of Informatics and Radioelectronics»Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki1729-76482019-06-01021117622ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITSE. V. Listopad0Белорусский государственный университет информатики и радиоэлектроникиAn analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper. The hardware implementations of the hash function SHA-1 for high performance applications were described.https://doklady.bsuir.by/jour/article/view/623cryptographic hash function sha-1pipeline circuitspecialized processor
spellingShingle E. V. Listopad
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki
cryptographic hash function sha-1
pipeline circuit
specialized processor
title ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
title_full ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
title_fullStr ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
title_full_unstemmed ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
title_short ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
title_sort analysis of implementations of the cryptographic hash function sha 1 based on pipeline circuits
topic cryptographic hash function sha-1
pipeline circuit
specialized processor
url https://doklady.bsuir.by/jour/article/view/623
work_keys_str_mv AT evlistopad analysisofimplementationsofthecryptographichashfunctionsha1basedonpipelinecircuits