{"id":"https://openalex.org/W4416429942","doi":"https://doi.org/10.1109/iccad66269.2025.11240995","title":"Gotta Hash \u2019Em All! Accelerating Hash Functions for Zero-Knowledge Proof Applications","display_name":"Gotta Hash \u2019Em All! Accelerating Hash Functions for Zero-Knowledge Proof Applications","publication_year":2025,"publication_date":"2025-10-26","ids":{"openalex":"https://openalex.org/W4416429942","doi":"https://doi.org/10.1109/iccad66269.2025.11240995"},"language":null,"primary_location":{"id":"doi:10.1109/iccad66269.2025.11240995","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad66269.2025.11240995","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM International Conference On Computer Aided Design (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056927195","display_name":"Nojan Sheybani","orcid":"https://orcid.org/0000-0002-4329-0197"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nojan Sheybani","raw_affiliation_strings":["University of California San Diego"],"affiliations":[{"raw_affiliation_string":"University of California San Diego","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107063010","display_name":"Ting Gong","orcid":"https://orcid.org/0000-0002-9402-8199"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tengkai Gong","raw_affiliation_strings":["University of California San Diego"],"affiliations":[{"raw_affiliation_string":"University of California San Diego","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112605433","display_name":"Anees Ahmed","orcid":"https://orcid.org/0000-0002-4596-5389"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anees Ahmed","raw_affiliation_strings":["Arizona State University"],"affiliations":[{"raw_affiliation_string":"Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114654076","display_name":"Nges Brian Njungle","orcid":"https://orcid.org/0009-0006-3393-6851"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nges Brian Njungle","raw_affiliation_strings":["Arizona State University"],"affiliations":[{"raw_affiliation_string":"Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069200437","display_name":"Michel A. Kinsy","orcid":"https://orcid.org/0000-0002-1432-6939"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michel Kinsy","raw_affiliation_strings":["Arizona State University"],"affiliations":[{"raw_affiliation_string":"Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019931011","display_name":"Farinaz Koushanfar","orcid":"https://orcid.org/0000-0003-0798-3794"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Farinaz Koushanfar","raw_affiliation_strings":["University of California San Diego"],"affiliations":[{"raw_affiliation_string":"University of California San Diego","institution_ids":["https://openalex.org/I36258959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5056927195"],"corresponding_institution_ids":["https://openalex.org/I36258959"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1998319,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9394000172615051,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9394000172615051,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.009999999776482582,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.009600000455975533,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8464999794960022},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.7159000039100647},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.4902999997138977},{"id":"https://openalex.org/keywords/security-of-cryptographic-hash-functions","display_name":"Security of cryptographic hash functions","score":0.478300005197525},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.46869999170303345},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45339998602867126},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.43720000982284546},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.4027999937534332},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.3903000056743622},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.38269999623298645}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8464999794960022},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8144999742507935},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.7159000039100647},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.4902999997138977},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.478300005197525},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.46869999170303345},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45339998602867126},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.43720000982284546},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4339999854564667},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.4027999937534332},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.3903000056743622},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.38850000500679016},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.38269999623298645},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3808000087738037},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36079999804496765},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.36059999465942383},{"id":"https://openalex.org/C116058348","wikidata":"https://www.wikidata.org/wiki/Q846912","display_name":"Universal hashing","level":5,"score":0.35510000586509705},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.3416999876499176},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.33869999647140503},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.33809998631477356},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.3352000117301941},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.31220000982284546},{"id":"https://openalex.org/C133358856","wikidata":"https://www.wikidata.org/wiki/Q7395188","display_name":"SWIFFT","level":5,"score":0.3075999915599823},{"id":"https://openalex.org/C162372511","wikidata":"https://www.wikidata.org/wiki/Q218341","display_name":"Checksum","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.3034000098705292},{"id":"https://openalex.org/C123436394","wikidata":"https://www.wikidata.org/wiki/Q7249984","display_name":"Proof-of-work system","level":3,"score":0.2919999957084656},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C2777480716","wikidata":"https://www.wikidata.org/wiki/Q23582796","display_name":"Resource consumption","level":2,"score":0.27160000801086426},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.26510000228881836},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.25949999690055847},{"id":"https://openalex.org/C27353603","wikidata":"https://www.wikidata.org/wiki/Q16948622","display_name":"Hash tree","level":4,"score":0.257999986410141},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.2524000108242035},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccad66269.2025.11240995","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad66269.2025.11240995","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM International Conference On Computer Aided Design (ICCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1553083934","https://openalex.org/W1838691944","https://openalex.org/W2025389898","https://openalex.org/W2140065255","https://openalex.org/W2148645909","https://openalex.org/W2242540160","https://openalex.org/W2552640487","https://openalex.org/W2811026317","https://openalex.org/W3158989923","https://openalex.org/W3165659700","https://openalex.org/W3204905537","https://openalex.org/W3213013974","https://openalex.org/W3214573664","https://openalex.org/W4308361277","https://openalex.org/W4318541683","https://openalex.org/W4380081638","https://openalex.org/W4385654519","https://openalex.org/W4386763924","https://openalex.org/W4390872697","https://openalex.org/W4402355140","https://openalex.org/W4404390988","https://openalex.org/W4404954873"],"related_works":[],"abstract_inverted_index":{"Collision-resistant":[0],"cryptographic":[1],"hash":[2,220],"functions":[3,221],"(CRHs)":[4],"are":[5,42,145],"crucial":[6],"for":[7,10,27,44,83,190,199],"security,":[8],"particularly":[9],"message":[11],"authentication":[12],"in":[13,35],"Zero-knowledge":[14],"Proof":[15],"(ZKP)":[16],"applications.":[17],"However,":[18],"traditional":[19],"CRHs":[20],"like":[21],"SHA-2":[22],"or":[23],"SHA-3,":[24],"while":[25],"optimized":[26],"CPUs,":[28],"generate":[29],"large":[30,191],"circuits,":[31],"rendering":[32],"them":[33],"inefficient":[34],"the":[36,136,157,187,195,210,214],"ZK":[37],"domain.":[38],"Conversely,":[39],"ZK-friendly":[40,86,219],"hashes":[41,59],"designed":[43],"circuit":[45],"efficiency":[46],"but":[47],"struggle":[48],"on":[49,64],"conventional":[50],"hardware,":[51],"often":[52],"orders":[53],"of":[54,80,163,197],"magnitude":[55],"slower":[56],"than":[57,170],"standard":[58],"due":[60],"to":[61,108,112,212,217],"their":[62],"reliance":[63],"expensive":[65],"finite":[66],"field":[67,224],"arithmetic.":[68],"To":[69],"bridge":[70],"this":[71],"performance":[72],"gap,":[73],"we":[74],"present":[75],"HashEmAll,":[76],"a":[77,140],"novel":[78],"collection":[79],"FPGA-based":[81],"realizations":[82],"three":[84],"prominent":[85],"hashes:":[87],"Griffin,":[88],"Rescue-Prime,":[89],"and":[90,102,119,151,160,222],"Reinforced":[91],"Concrete.":[92],"Each":[93],"offers":[94],"distinct":[95],"optimization":[96],"pro":[97],"les,":[98],"with":[99,135,147,153,182],"both":[100],"area-optimized":[101],"latency-optimized":[103,125],"variants":[104],"available,":[105],"allowing":[106],"users":[107],"tailor":[109],"hardware":[110],"selection":[111],"specific":[113],"application":[114],"constraints":[115],"regarding":[116],"resource":[117],"utilization":[118],"performance.Our":[120],"extensive":[121],"evaluation":[122],"shows":[123],"that":[124],"HashEmAll":[126,164,198,215],"designs":[127],"outperform":[128],"CPU":[129],"implementations":[130],"by":[131,185],"at":[132],"least":[133],"10\u00d7,":[134],"leading":[137],"design":[138],"achieving":[139],"23\u00d7":[141],"speedup.":[142],"These":[143],"gains":[144],"coupled":[146],"lower":[148],"power":[149],"consumption":[150],"compatibility":[152],"accessible":[154],"FPGAs.":[155],"Importantly,":[156],"highly":[158],"parallel":[159],"pipelined":[161],"architecture":[162],"enables":[165],"significantly":[166],"better":[167],"practical":[168],"scaling":[169],"CPU-based":[171],"approaches":[172],"towards":[173],"building":[174],"real-world":[175,200],"ZKP":[176,201],"applications,":[177],"such":[178],"as":[179],"data":[180,205],"commitments":[181],"Merkle":[183],"Trees,":[184],"mitigating":[186],"hashing":[188],"bottleneck":[189],"trees.":[192],"This":[193],"highlights":[194],"suitability":[196],"applications":[202],"involving":[203],"large-scale":[204],"authentication.":[206],"We":[207],"also":[208],"highlight":[209],"ability":[211],"translate":[213],"methodology":[216],"various":[218],"different":[223],"sizes.":[225]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-20T00:00:00"}
