-
1
-
-
1942452682
-
-
SHA-1 Standard, National Institute of Standard and Technology (NIST), Secure Hash Standard, FIPS PUB 180-1, on line available at www.itl.nist.gov/fipspubs/fip180-1.htm.
-
-
-
-
2
-
-
0003508558
-
Advanced encryption standard
-
"Advanced encryption standard", on line available at http://csrc.nist.gov
-
-
-
-
3
-
-
1942421090
-
-
SHA-2 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-2, on line available at http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
-
-
-
-
4
-
-
1942517235
-
-
"NESSIE. New European scheme for signatures, integrity, and encryption", http://www.cosic.esat.kuleuven.ac.be/nessie
-
-
-
-
5
-
-
50249128279
-
The whirlpool hashing function
-
Primitive submitted to NESSIE, September 2000, revised on May
-
P. S. L. M. Barreto and V. Rijmen, "The Whirlpool hashing function". Primitive submitted to NESSIE, September 2000, revised on May 2003, http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html
-
(2003)
-
-
Barreto, P.S.L.M.1
Rijmen, V.2
-
6
-
-
1942485198
-
ISO/IEC 10118-3: Information technology - Security techniques - Hash functions - Part 3: Dedicated hash-functions
-
International Organization for Standardization, "ISO/IEC 10118-3: Information technology - Security techniques - Hash functions - Part 3: Dedicated hash-functions", 2003.
-
(2003)
-
-
-
7
-
-
1942485200
-
FPGA implementation of MD5 has algorithm
-
Janaka Deepakumara, Howard M. Heys and R. Venkatesam, "FPGA Implementation of MD5 has algorithm", Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2001), Toronto, Ontario, May 2001.
-
Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2001), Toronto, Ontario, May 2001
-
-
Deepakumara, J.1
Heys, H.M.2
Venkatesam, R.3
-
8
-
-
0036287554
-
Random number generator architecture and VLSI implementation
-
N. Sklavos, P. Kitsos, K. Papadomanolakis and O. Koufopavlou, "Random number generator architecture and VLSI implementation", Proceedings of IEEE International Symposium of Circuits and Systems (ISCAS 2002), USA, 2002.
-
Proceedings of IEEE International Symposium of Circuits and Systems (ISCAS 2002), USA, 2002
-
-
Sklavos, N.1
Kitsos, P.2
Papadomanolakis, K.3
Koufopavlou, O.4
-
9
-
-
84966444577
-
An efficient implementation of hash function processor for IPSEC
-
Yong kyu Kang, Dae Won Kim, Taek Won Kwon and Jun Rim Choi, "An efficient implementation of hash function processor for IPSEC", Proceedings of Third IEEE Asia-Pacific Conference on ASICs, Taipei, Taiwan, August 6-8, 2002.
-
Proceedings of Third IEEE Asia-Pacific Conference on ASICs, Taipei, Taiwan, August 6-8, 2002
-
-
Kang, Y.K.1
Kim, D.W.2
Kwon, T.W.3
Choi, J.R.4
-
11
-
-
84945300922
-
Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512
-
Springer-Verlag, Sao Paulo, Brazil, September 30-October 2
-
Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, and Brian Schott, "Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512", Proceedings of fifth International Conference on Information Security (ISC 2002), LNCS, Vol. 2433, Springer-Verlag, Sao Paulo, Brazil, September 30-October 2, 2002.
-
(2002)
Proceedings of Fifth International Conference on Information Security (ISC 2002), LNCS
, vol.2433
-
-
Grembowski, T.1
Lien, R.2
Gaj, K.3
Nguyen, N.4
Bellows, P.5
Flidr, J.6
Lehman, T.7
Schott, B.8
-
12
-
-
24744466328
-
Hash algorithm for cryptographic protocols: FPGA implementation
-
Diez, J. M., Bojanic S., Stanimirovic, Lj., Carreras C., Nieto-Taladriz O., "Hash algorithm for cryptographic protocols: FPGA implementation", Proceedings of 10th Telecommunications forum (TELFOR 2002), November 26-28, Belgrade, Yugoslavia, 2002.
-
Proceedings of 10th Telecommunications Forum (TELFOR 2002), November 26-28, Belgrade, Yugoslavia, 2002
-
-
Diez, J.M.1
Bojanic, S.2
Stanimirovic, Lj.3
Carreras, C.4
Nieto-Taladriz, O.5
-
13
-
-
0037744606
-
On the hardware implementation of the SHA-2 (256, 384, 512) hash functions
-
N. Sklavos and O. Koufopavlou, "On the hardware implementation of the SHA-2 (256, 384, 512) hash functions", Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS 2003), May 25-28, Bangkok, Thailand, 2003.
-
Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS 2003), May 25-28, Bangkok, Thailand, 2003
-
-
Sklavos, N.1
Koufopavlou, O.2
-
15
-
-
0004143352
-
Cipher and hash function design strategies based on linear and differential cryptoanalysis
-
Ph. D. thesis, KU Leuven, March
-
J. Daemen, Cipher and hash function design strategies based on linear and differential cryptoanalysis, Ph. D. thesis, KU Leuven, March 1995.
-
(1995)
-
-
Daemen, J.1
|