International Conference on Electronics, Communication and Information systems |
Foundation of Computer Science USA |
ICECI - Number 3 |
November 2012 |
Authors: M. Rajaram, M. Arul Then Mathi |
c8a584f9-ee06-4642-9616-745b5d7f0d3c |
M. Rajaram, M. Arul Then Mathi . Implementation of Cryptography Hash Function Blake 64 bit using SHA-3 Algorithm. International Conference on Electronics, Communication and Information systems. ICECI, 3 (November 2012), 16-21.
Hash functions form an important category of cryptography, which is widely used in a great number of protocols and security mechanisms. In this paper the VLSI implementation of one of the 14 "second-round" candidates BLAKE for 64 bit and the round rescheduling technique design are proposed by using modulo 2n adder and adiabatic multiplexer for high throughput when compared to SHA 2.