Athar Mahboob | National University of Sciences & Technology (NUST) (original) (raw)

Uploads

Papers by Athar Mahboob

Research paper thumbnail of Novel Arithmetic Architecture for High Performance Implementation of SHA3 Finalist Keccak on FPGA Platforms

We propose high speed architecture for Keccak using Look-Up Table (LUT) resources on FPGAs, to mi... more We propose high speed architecture for Keccak using Look-Up Table (LUT) resources on FPGAs, to minimize area of Keccak data path and to reduce critical path lengths. This approach allows us to design Keccak data path with minimum resources and higher clock frequencies. We show our results in the form of chip area consumption, throughput and throughput per area. At this time, the design presented in this work is the highest in terms of throughput for any of SHA-3 candidates, achieving a figure of 13.67Gbps for Keccak-256 on Virtex 6. This can enable line rate operation for hashing on 10Gbps network interfaces.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Look-Up Table Based Implementations of SHA3 Finalists: JH, Keccak and Skein

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Intrusion avoidance for SCADA security in industrial plants

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Optimal utilization of available reconfigurable hardware resources

Computers & Electrical Engineering

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient resource utilization of FPGAs

ABSTRACT With growing use of FPGAs it is becoming more and more crucial that how to effectively a... more ABSTRACT With growing use of FPGAs it is becoming more and more crucial that how to effectively and efficiently utilize the in-ternal resources of these devices. Normal coding techniques and synthesis tools implement every logic to a LUT based architecture. Which utilizes more ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of High Throughput Hardware Implementation of Secure Hash Algorithm (SHA3) Finalist: BLAKE

ABSTRACT Cryptographic hash functions are widely used in many information security applications l... more ABSTRACT Cryptographic hash functions are widely used in many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In response to recent advances in cryptanalysis of commonly used hash ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A parameterized design of Modular Exponentiation on reconfigurable platforms for RSA cryptographic processor

Modular Exponentiation is at the heart of various arithmetic architectures used in most Public Ke... more Modular Exponentiation is at the heart of various arithmetic architectures used in most Public Key cryptography algorithms. Modular Exponentiation of large numbers requires excessive processing. An efficient implementation of modular exponentiation may help overcome the speed issues of public Key Cryptography. in this work, the most promising technique of Montgomery modular exponentiation and its optimizations have been deeply explored. We have been able to achieve performance results which are better than earlier published results. Full bit length modular exponentiations with different word sizes and radices are implemented and there results are shown.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Lookup table based multiplication technique for GF(2m) with cryptographic significance

Iee Proceedings-communications, 2005

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Faster polynomial basis finite field squaring and inversion for GF(2m) with cryptographic software application

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Novel Arithmetic Architecture for High Performance Implementation of SHA3 Finalist Keccak on FPGA Platforms

We propose high speed architecture for Keccak using Look-Up Table (LUT) resources on FPGAs, to mi... more We propose high speed architecture for Keccak using Look-Up Table (LUT) resources on FPGAs, to minimize area of Keccak data path and to reduce critical path lengths. This approach allows us to design Keccak data path with minimum resources and higher clock frequencies. We show our results in the form of chip area consumption, throughput and throughput per area. At this time, the design presented in this work is the highest in terms of throughput for any of SHA-3 candidates, achieving a figure of 13.67Gbps for Keccak-256 on Virtex 6. This can enable line rate operation for hashing on 10Gbps network interfaces.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Look-Up Table Based Implementations of SHA3 Finalists: JH, Keccak and Skein

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Intrusion avoidance for SCADA security in industrial plants

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Optimal utilization of available reconfigurable hardware resources

Computers & Electrical Engineering

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient resource utilization of FPGAs

ABSTRACT With growing use of FPGAs it is becoming more and more crucial that how to effectively a... more ABSTRACT With growing use of FPGAs it is becoming more and more crucial that how to effectively and efficiently utilize the in-ternal resources of these devices. Normal coding techniques and synthesis tools implement every logic to a LUT based architecture. Which utilizes more ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of High Throughput Hardware Implementation of Secure Hash Algorithm (SHA3) Finalist: BLAKE

ABSTRACT Cryptographic hash functions are widely used in many information security applications l... more ABSTRACT Cryptographic hash functions are widely used in many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In response to recent advances in cryptanalysis of commonly used hash ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A parameterized design of Modular Exponentiation on reconfigurable platforms for RSA cryptographic processor

Modular Exponentiation is at the heart of various arithmetic architectures used in most Public Ke... more Modular Exponentiation is at the heart of various arithmetic architectures used in most Public Key cryptography algorithms. Modular Exponentiation of large numbers requires excessive processing. An efficient implementation of modular exponentiation may help overcome the speed issues of public Key Cryptography. in this work, the most promising technique of Montgomery modular exponentiation and its optimizations have been deeply explored. We have been able to achieve performance results which are better than earlier published results. Full bit length modular exponentiations with different word sizes and radices are implemented and there results are shown.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Lookup table based multiplication technique for GF(2m) with cryptographic significance

Iee Proceedings-communications, 2005

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Faster polynomial basis finite field squaring and inversion for GF(2m) with cryptographic software application

ABSTRACT

Bookmarks Related papers MentionsView impact

Log In