Custom ASIC Design for SHA-256 Using Open-Source Tools

The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and integrity. The inherent SHA-256 computational ove...

Full description

Bibliographic Details
Main Authors: Lucas Daudt Franck, Gabriel Augusto Ginja, João Paulo Carmo, José A. Afonso, Maximiliam Luppe
Format: Article
Language:English
Published: MDPI AG 2023-12-01
Series:Computers
Subjects:
Online Access:https://www.mdpi.com/2073-431X/13/1/9