ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper. The hardware implementations of the hash function SHA-1 for high performance applications were described.
Saved in:
| Main Author: | E. V. Listopad |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
Educational institution «Belarusian State University of Informatics and Radioelectronics»
2019-06-01
|
| Series: | Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki |
| Subjects: | |
| Online Access: | https://doklady.bsuir.by/jour/article/view/623 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions
by: Mark Vainer, et al.
Published: (2025-07-01) -
Hyperchaotic hashing: a chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure
by: Hao Xing, et al.
Published: (2025-02-01) -
Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification
by: L. V. Cherkesova, et al.
Published: (2025-04-01) -
An Ordered Universal Accumulator Based on a Hash Chain
by: Wenbao Jiang, et al.
Published: (2025-02-01) -
Reducing Power of BLAKE3 implementations with dedicated FPGA resources
by: Jarosław Sugier
Published: (2025-07-01)