메뉴 건너뛰기




Volumn , Issue , 2005, Pages 222-229

Quasi-pipelined hash circuits

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER HARDWARE; CRYPTOGRAPHY; FUNCTIONS; NATURAL FREQUENCIES; OPTIMIZATION;

EID: 27944450139     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (24)

References (22)
  • 3
    • 3042615299 scopus 로고    scopus 로고
    • The design of a high-speed asic unit for the hash function sha-256 (384, 512)
    • L. Dadda, M. Macchetti, and J. Owen. The design of a high-speed asic unit for the hash function sha-256 (384, 512). In Proceedings of DATE 2004, Vol. 3, pages 70-75, 2004.
    • (2004) Proceedings of DATE 2004, Vol. 3 , vol.3 , pp. 70-75
    • Dadda, L.1    Macchetti, M.2    Owen, J.3
  • 4
    • 2942671000 scopus 로고    scopus 로고
    • An asic design for a high speed implementation of the hash function sha-256 (384, 512)
    • L. Dadda, M. Macchetti, J. Owen, and S. Chakrabarti. An asic design for a high speed implementation of the hash function sha-256 (384, 512). In Proceedings of GLSVLSI 2004, pages 421-425, 2004.
    • (2004) Proceedings of GLSVLSI 2004 , pp. 421-425
    • Dadda, L.1    Macchetti, M.2    Owen, J.3    Chakrabarti, S.4
  • 5
    • 84985792472 scopus 로고
    • A framework for the design of oneway hash functions including cryptanalysis of damgård's oneway function based on a cellular automaton
    • J. Daemen, R. Govaerts, and J. Vandewalle. A framework for the design of oneway hash functions including cryptanalysis of damgård's oneway function based on a cellular automaton. In Advances in Cryptology: Asiacrypt'91 Proceedings, pages 82-96, 1993.
    • (1993) Advances in Cryptology: Asiacrypt'91 Proceedings , pp. 82-96
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 7
    • 35048844179 scopus 로고    scopus 로고
    • Security analysis of sha-256 and sisters
    • H. Gilbert and H. Handschuh. Security analysis of sha-256 and sisters. In Proceedings of SAC 2003, pages 175-193, 2003.
    • (2003) Proceedings of SAC 2003 , pp. 175-193
    • Gilbert, H.1    Handschuh, H.2
  • 11
  • 13
    • 0017310649 scopus 로고
    • Improving the throughput of a pipeline by insertion of delays
    • J. H. Patel. Improving the throughput of a pipeline by insertion of delays. ACM SIGARCH Computer Architecture News, 4(4): 159-164, 1976.
    • (1976) ACM SIGARCH Computer Architecture News , vol.4 , Issue.4 , pp. 159-164
    • Patel, J.H.1
  • 17
    • 84893669641 scopus 로고    scopus 로고
    • Exploiting data forwarding to reduce the power budget of vliw embedded processors
    • M. Sami, D. Sciuto, C. Silvano, V. Zaccaria, and R. Zafalon. Exploiting data forwarding to reduce the power budget of vliw embedded processors. In Proceedings of DATE 2001, pages 252-257, 2001.
    • (2001) Proceedings of DATE 2001 , pp. 252-257
    • Sami, M.1    Sciuto, D.2    Silvano, C.3    Zaccaria, V.4    Zafalon, R.5
  • 18
    • 27944443972 scopus 로고    scopus 로고
    • The black-box model for cryptographic primitives
    • C. Schnorr and S. Vaudenay. The black-box model for cryptographic primitives. Journal of Cryptology, 11(2):125-140, 1998.
    • (1998) Journal of Cryptology , vol.11 , Issue.2 , pp. 125-140
    • Schnorr, C.1    Vaudenay, S.2
  • 19
    • 0037744606 scopus 로고    scopus 로고
    • On the hardware implementations of the sha-2(256,384,512) hash functions
    • N. Sklavos and O. Koufopavlou. On the hardware implementations of the sha-2(256,384,512) hash functions. In Proceedings of ISCAS 2003, 2003.
    • (2003) Proceedings of ISCAS 2003
    • Sklavos, N.1    Koufopavlou, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.