www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...
You are here : design-reuse-embedded.com  > Security  > Cryptography

13 Different Cryptographic Hash Functions Core

Overview

These are 13 different cryptographic hash function originally submitted to NIST hash function competition which made upto round 2. All of these cores are designed to deliver extremely high throughput of 35.7GBps with fully pipelined architecture running at 600Mhz on Ultrascale+ FPGAs. In this bundle of cores we have SHA-3, Keccak, Blake, Grostl, JH, Skein Cores that got selected for NIST round 3 and BMW, Echo, Shabal, Cubehash, Fugue and Luffa from NIST round 2. We also have Whirlpool hash function on this bundle. It is primarily targeted for extremely high throughput applications with input and output width of 512-bit while the Core can be modified for any bit-width and range of applications like Security, FinTech and Encryption/Decryption.

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.