| IEEE Access | |
| SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey | |
| Raffaele Martino1  Alessandro Cilardo1  | |
| [1] Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy; | |
| 关键词: Accelerators; Hash functions; SHA-2; | |
| DOI : 10.1109/ACCESS.2020.2972265 | |
| 来源: DOAJ | |
【 摘 要 】
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application domains, e.g. blockchains or trusted IoT components, has made the acceleration of SHA-2 very challenging due to new stringent classes of requirements, especially implementation cost and energy efficiency. The survey discusses these emerging applications and their fundamental requirements. Then, the work presents a comprehensive review of the different design techniques available in the literature for SHA-2 acceleration. The main focus of the presentation is placed on the impact of each design technique on the area, energy, power, and performance of the resulting accelerator, guiding the designer through the identification of the appropriate technique mixes which meet the constraints of any given application.
【 授权许可】
Unknown