메뉴 건너뛰기




Volumn 50, Issue 1, 2004, Pages 208-213

Efficient architecture and hardware implementation of the whirlpool hash function

Author keywords

Cryptography; NESSIE; Pipelined architectures; Whirlpool hash function

Indexed keywords

ALGORITHMS; COMPUTER HARDWARE; CONSUMER ELECTRONICS; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PIPELINE PROCESSING SYSTEMS; VLSI CIRCUITS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 1942423672     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2004.1277864     Document Type: Article
Times cited : (19)

References (15)
  • 1
    • 1942452682 scopus 로고    scopus 로고
    • SHA-1 Standard, National Institute of Standard and Technology (NIST), Secure Hash Standard, FIPS PUB 180-1, on line available at www.itl.nist.gov/fipspubs/fip180-1.htm.
  • 2
    • 0003508558 scopus 로고    scopus 로고
    • Advanced encryption standard
    • "Advanced encryption standard", on line available at http://csrc.nist.gov
  • 3
    • 1942421090 scopus 로고    scopus 로고
    • SHA-2 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-2, on line available at http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
  • 4
    • 1942517235 scopus 로고    scopus 로고
    • "NESSIE. New European scheme for signatures, integrity, and encryption", http://www.cosic.esat.kuleuven.ac.be/nessie
  • 5
    • 50249128279 scopus 로고    scopus 로고
    • The whirlpool hashing function
    • Primitive submitted to NESSIE, September 2000, revised on May
    • P. S. L. M. Barreto and V. Rijmen, "The Whirlpool hashing function". Primitive submitted to NESSIE, September 2000, revised on May 2003, http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html
    • (2003)
    • Barreto, P.S.L.M.1    Rijmen, V.2
  • 6
    • 1942485198 scopus 로고    scopus 로고
    • ISO/IEC 10118-3: Information technology - Security techniques - Hash functions - Part 3: Dedicated hash-functions
    • International Organization for Standardization, "ISO/IEC 10118-3: Information technology - Security techniques - Hash functions - Part 3: Dedicated hash-functions", 2003.
    • (2003)
  • 15
    • 0004143352 scopus 로고
    • Cipher and hash function design strategies based on linear and differential cryptoanalysis
    • Ph. D. thesis, KU Leuven, March
    • J. Daemen, Cipher and hash function design strategies based on linear and differential cryptoanalysis, Ph. D. thesis, KU Leuven, March 1995.
    • (1995)
    • Daemen, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.