M Rajaram and Arul Then M Mathi. Article: Implementation of Cryptography Hash Function Blake 64 bit using SHA-3 Algorithm. IJCA Special Issue on International Conference on Electronics, Communication and Information systems ICECI(3):16-21, November 2012. Full text available. BibTeX
@article{key:article, author = {M. Rajaram and M. Arul Then Mathi}, title = {Article: Implementation of Cryptography Hash Function Blake 64 bit using SHA-3 Algorithm}, journal = {IJCA Special Issue on International Conference on Electronics, Communication and Information systems}, year = {2012}, volume = {ICECI}, number = {3}, pages = {16-21}, month = {November}, note = {Full text available} }
Hash functions form an important category of cryptography, which is widely used in a great number of protocols and security mechanisms. In this paper the VLSI implementation of one of the 14 "second-round" candidates BLAKE for 64 bit and the round rescheduling technique design are proposed by using modulo 2n adder and adiabatic multiplexer for high throughput when compared to SHA 2.