SHA-RV: A RISC-V Accelerator for SHA-224/256 with Cycle Reduced ISA Extensions for Blockchain Applications
Abstract
References
K. Asanovi´c and D. A. Patterson, “Instruction sets should be free: The case for RISC-V,” EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS2014-146, 2014.
T. N. Van, P. H. Pham, V. T. D. Le, H. L. Pham, T. H. Vu, and T. D. Tran, “AES-RV: Hardware-efficient RISC-V accelerator with low-latency AES instruction extension for IoT security,” IEICE Electronics Express, vol. 22, no. 16, pp. 20250329–20250329, 2025.
M. Ao, X. Zhou, X. Kong, S. Gou, S. Chen, X. Dong, Y. Zhu, Q. Sun, Z. Zhang, J. Zhang et al., “A RISC-V 32-bit microprocessor based on two-dimensional semi conductors,” Nature, pp. 1–8, 2025.
N. H. Nguyen, D. H. A. Le, V. T. D. Le, V. T. Nguyen, T. H. Vu, H. L. Pham, and Y. Nakashima, “LI-RV: A Fast and Efficient RISC-V based Coprocessor for Lightweight Cryptography,” in 2024 21st International SoC Design Conference (ISOCC). IEEE, 2024, pp. 1–2.
A. Waterman and K. Asanovi´c, “The RISC-V instruction set manual, volume I: User-level ISA,” in Technical Report UCB/EECS-2014-54, EECS Department, University of California, Berkeley, 2014.
J. Park, K. Han, E. Choi, J.-J. Lee, K. Lee, W. Lee, and M. Pedram, “Designing low-power RISC-V multicore processors with a shared lightweight floating point unit for IoT endnodes,” IEEE Transactions on Circuits and Systems I: Regular Papers, 2024.
V. T. D. Le, D. H. A. Le, T. H. Y. Tran, T. H. Vu, and H. L. Pham, “RVCP: High-Efficiency RISC-V Co-Processor for Security Applications in IoT and Server Systems,” in 2023 International Conference on Advanced Technologies for Communications (ATC), 2023, pp. 1–6.
D. H. A. Le, V. T. D. Le, V. A. Ho, V. T. Nguyen, H. L. Pham, V. D. Tran, T. H. Vu, and Y. Nakashima, “High Efficiency RISC-V-Based Cryptographic Coprocessor for Security Applications,” in 2024 21st International SoC Design Conference (ISOCC). IEEE, 2024, pp. 103–104.
National Institute of Standards and Technology, “Secure Hash Standard (SHS),” U.S. Department of Commerce, Tech. Rep., August 2015.
F. Kahri, H. Mestiri, B. Bouallegue, and M. Machhout, “Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256,” in 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15). IEEE, 2015, pp. 1–5.
T. Li, C. Cheng, R. Wang, C. Wang, X. Zou, and D. Yu, “A High Performance Hardware Implementation of SHA 256 Algorithm,” in 2024 IEEE 4th International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), vol. 4. IEEE, 2024, pp. 477–481.
M. Kammoun, M. Elleuchi, M. Abid, and M. S. BenSaleh,
“FPGA-based implementation of the SHA-256 hash algo rithm,” in 2020 IEEE international conference on design & test of integrated micro & nano-systems (DTS). IEEE, 2020, pp. 1–6.
S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Decentralized Business Review, p. 21260, 2008.
A. A. Ahmed and O. O. Alabi, “Secure and scalable blockchain-based federated learning for cryptocurrency fraud detection: A systematic review,” IEEE Access, vol. 12, pp. 102219–102241, 2024.
U. Q. Bajra, E. Rogova, and S. Avdiaj, “Cryptocurrency blockchain and its carbon footprint: Anticipating future challenges,” Technology in Society, vol. 77, p. 102571, 2024.
R. Martino and A. Cilardo, “Designing a SHA-256 processor for blockchain-based IoT applications,” Internet of Things, vol. 11, p. 100254, 2020.
Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv, “Edge Computing Security: State of the Art and Challenges,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1608–1631, 2019.
V. T. D. Le, H. L. Pham, T. H. Tran, T. S. Duong, and Y. Nakashima, “Efficient and high-speed cgra acceler
ator for cryptographic applications,” in 2023 Eleventh International Symposium on Computing and Networking
(CANDAR). IEEE, 2023, pp. 189–195.
J. Wu, X. Zheng, S. Zeng, H. Gao, and X. Xiong, “High Performance Cryptographic SoC Virtual Prototyping
Platform Based on RISC-V VP,” in 2022 6th International Conference on High Performance Compilation, Computing and Communications (HP3C), 2022, pp. 84–90.
F. Kreff, L. R. Prade, R. M. de Figueiredo, and J. Schmith, “A RISC-V Approach to Energy-Efficient Cryptographic Processing in IoT Application,” in 2025 IEEE Latin Conference on IoT (LCIoT), 2025, pp. 298–301.
V. T. D. Le, H. L. Pham, T. H. Tran, and Y. Nakashima, “Flexible and Energy-efficient Crypto-Processor for Arbitrary Input Length Processing in Blockchain-based IoT Applications,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 107, no. 3, pp. 319–330, 2024.
V. T. D. Le, P. H. Luan, T. H. Tran, and Y. Nakashima, “CSIP: A Compact Scrypt IP design with single PBKDF2 core for Blockchain mining,” in 2022 35th SBC/SBMicro/IEEE/ACM Symposium on Integrated Circuits
and Systems Design (SBCCI). IEEE, 2022, pp. 1–6.
DOI: http://dx.doi.org/10.21553/rev-jec.423
Copyright (c) 2025 REV Journal on Electronics and Communications
ISSN: 1859-378X Copyright © 2011-2025 |
|