Martino, Raffaele (2020) Exploring the SHA-2 Design Space. [Tesi di dottorato]
Preview |
Text
PhDThesis.pdf Download (3MB) | Preview |
Item Type: | Tesi di dottorato |
---|---|
Resource language: | English |
Title: | Exploring the SHA-2 Design Space |
Creators: | Creators Email Martino, Raffaele raffaele.martino2@unina.it |
Date: | 13 March 2020 |
Number of Pages: | 139 |
Institution: | Università degli Studi di Napoli Federico II |
Department: | Ingegneria Elettrica e delle Tecnologie dell'Informazione |
Dottorato: | Information technology and electrical engineering |
Ciclo di dottorato: | 32 |
Coordinatore del Corso di dottorato: | nome email Riccio, Daniele daniele.riccio@unina.it |
Tutor: | nome email Cilardo, Alessandro UNSPECIFIED |
Date: | 13 March 2020 |
Number of Pages: | 139 |
Keywords: | Crittografia, Hash, FPGA, SHA-2, Design Space Exploration |
Settori scientifico-disciplinari del MIUR: | Area 09 - Ingegneria industriale e dell'informazione > ING-INF/05 - Sistemi di elaborazione delle informazioni |
Date Deposited: | 05 Apr 2020 20:29 |
Last Modified: | 08 Nov 2021 12:23 |
URI: | http://www.fedoa.unina.it/id/eprint/13134 |
Collection description
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application domains, such as blockchains or trusted IoT components, has made the acceleration of SHA-2 very challenging due to new stringent classes of requirements imposed by such domains, especially implementation cost and energy efficiency. This Ph.D. thesis explores the SHA-2 design space from different viewpoints. Its first contribution is a reasoned classification of the many SHA-2 designs proposed in the literature according to their architectural choices, each of them having different implications on the application requirement. Based on this analysis, this thesis introduces a framework and a methodology for evaluating and comparing different implementation options, which is used to assess the impact of each architectural technique on the application requirements, as well as the effect of variations in the underlying target technology. The last contribution of this thesis explores a different approach, namely utilising a specific target technology with maximum efficiency, and the resulting SHA-2 accelerator shows the best area efficiency reported so far in the literature.
Downloads
Downloads per month over past year
Actions (login required)
View Item |