FPGA Implementation of Tiger Hash Function
2006 IEEE International Conference on Electro/information Technology
East Lansing, MI
Source of Publication
Electro/information Technology, 2006 IEEE International Conference on
New hash function algorithms have a potential application compared to the conventional MD family hash functions. The architecture and FPGA implementation of a secure hash function Tiger is introduced in this paper. The design was coded using VHDL and for the hardware implementation a Xilinx FPGA device was used. While no other previous Tiger implementations exist, the comparisons are conducted with previous hash functions especially Whirlpool function. The comparisons show that the proposed Tiger function could be used in the application where area is a design constraint, and where a different hash function from MD family of hash function such as Tiger, Whirlpool, is needed for the design
Whirlpool function, FPGA implementation, Tiger hash function, VHDL, hardware implementation, hardware description languages, cryptography, field programmable gate arrays, Field programmable gate arrays, Cryptography, Information security, Communication system security, Embedded system, Digital signatures, Protection, Web server, Random number generation, Message authentication
Guoping Wang Dr. (2006).
FPGA Implementation of Tiger Hash Function. Electro/information Technology, 2006 IEEE International Conference on. IEEE.Presented at 2006 IEEE International Conference on Electro/information Technology, East Lansing, MI.
This document is currently not available here.