Visible to the public A Hardware Implementation of the SHA2 Hash Algorithms Using CMOS 28nm Technology

TitleA Hardware Implementation of the SHA2 Hash Algorithms Using CMOS 28nm Technology
Publication TypeConference Paper
Year of Publication2020
AuthorsBrazhnikov, S.
Conference Name2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)
Keywordsadders, CMOS 28nm technology, CMOS integrated circuits, CMOS technology, compositionality, cryptography, field programmable gate arrays, Hardware, hardware hash accelerator, Hardware Implementation, hash algorithms, Hash functions, Program processors, pubcrawl, Resiliency, secure hash algorithm 2, SHA-256, SHA2 Hash algorithms
AbstractThis article presents a hardware implementation review of a popular family of hash algorithms: Secure Hash Algorithm 2 (SHA2). It presents various schematic solutions and their assessments for 28 nm CMOS technology. Using this paper we can estimate the expected performance of the hardware hash accelerator based on the IC.
DOI10.1109/EIConRus49466.2020.9039083
Citation Keybrazhnikov_hardware_2020