TY - GEN
T1 - Hardware implementations of hash function Luffa
AU - Satoh, Akashi
AU - Katashita, Toshihiro
AU - Sugawara, Takeshi
AU - Homma, Naofumi
AU - Aoki, Takafumi
PY - 2010/8/24
Y1 - 2010/8/24
N2 - This paper presents hardware architectures for the hash algorithm Luffa, which is a candidate for the next-generation hash standard SHA-3. The architectures were implemented by using a 90-nm CMOS standard cell library. A high throughput of 35 Gbps for a high-speed architecture and a gate count of 14.7 kgate for a compact architecture were obtained. In comparison with Keccak, other SHA-3 candidate in the sponge function category, as well as with the current hash standard SHA-256, Luffa exhibited the advantage of flexible implementation ranging from high-speed to compact circuits.
AB - This paper presents hardware architectures for the hash algorithm Luffa, which is a candidate for the next-generation hash standard SHA-3. The architectures were implemented by using a 90-nm CMOS standard cell library. A high throughput of 35 Gbps for a high-speed architecture and a gate count of 14.7 kgate for a compact architecture were obtained. In comparison with Keccak, other SHA-3 candidate in the sponge function category, as well as with the current hash standard SHA-256, Luffa exhibited the advantage of flexible implementation ranging from high-speed to compact circuits.
UR - http://www.scopus.com/inward/record.url?scp=77955748332&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955748332&partnerID=8YFLogxK
U2 - 10.1109/HST.2010.5513102
DO - 10.1109/HST.2010.5513102
M3 - Conference contribution
AN - SCOPUS:77955748332
SN - 9781424478101
T3 - Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2010
SP - 130
EP - 134
BT - Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2010
T2 - 2010 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2010
Y2 - 13 June 2010 through 14 June 2010
ER -