-
3
-
-
3042615299
-
The design of a high-speed asic unit for the hash function sha-256 (384, 512)
-
L. Dadda, M. Macchetti, and J. Owen. The design of a high-speed asic unit for the hash function sha-256 (384, 512). In Proceedings of DATE 2004, Vol. 3, pages 70-75, 2004.
-
(2004)
Proceedings of DATE 2004, Vol. 3
, vol.3
, pp. 70-75
-
-
Dadda, L.1
Macchetti, M.2
Owen, J.3
-
4
-
-
2942671000
-
An asic design for a high speed implementation of the hash function sha-256 (384, 512)
-
L. Dadda, M. Macchetti, J. Owen, and S. Chakrabarti. An asic design for a high speed implementation of the hash function sha-256 (384, 512). In Proceedings of GLSVLSI 2004, pages 421-425, 2004.
-
(2004)
Proceedings of GLSVLSI 2004
, pp. 421-425
-
-
Dadda, L.1
Macchetti, M.2
Owen, J.3
Chakrabarti, S.4
-
5
-
-
84985792472
-
A framework for the design of oneway hash functions including cryptanalysis of damgård's oneway function based on a cellular automaton
-
J. Daemen, R. Govaerts, and J. Vandewalle. A framework for the design of oneway hash functions including cryptanalysis of damgård's oneway function based on a cellular automaton. In Advances in Cryptology: Asiacrypt'91 Proceedings, pages 82-96, 1993.
-
(1993)
Advances in Cryptology: Asiacrypt'91 Proceedings
, pp. 82-96
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
6
-
-
0032117669
-
Exhaustive scheduling and re-timing of digital signal processing systems
-
T. C. Denk and K. K. Parhi. Exhaustive scheduling and re-timing of digital signal processing systems. IEEE Trans, on Circuits and Systems, Part II: Analog and Digital Signal Processing, 45(7):821-838, 1998.
-
(1998)
IEEE Trans, on Circuits and Systems, Part II: Analog and Digital Signal Processing
, vol.45
, Issue.7
, pp. 821-838
-
-
Denk, T.C.1
Parhi, K.K.2
-
7
-
-
35048844179
-
Security analysis of sha-256 and sisters
-
H. Gilbert and H. Handschuh. Security analysis of sha-256 and sisters. In Proceedings of SAC 2003, pages 175-193, 2003.
-
(2003)
Proceedings of SAC 2003
, pp. 175-193
-
-
Gilbert, H.1
Handschuh, H.2
-
8
-
-
84945300922
-
Comparative analysis of the hardware implementations of hash functions sha-1 and sha-512
-
T. Grembowski, R. Lien, K. Gaj, N. Nguyen, P. Bellows, J. Flidr, T. Lehman, and B. Schott. Comparative analysis of the hardware implementations of hash functions sha-1 and sha-512. In Proceedings of ISC 2002, pages 75-89, 2002.
-
(2002)
Proceedings of ISC 2002
, pp. 75-89
-
-
Grembowski, T.1
Lien, R.2
Gaj, K.3
Nguyen, N.4
Bellows, P.5
Flidr, J.6
Lehman, T.7
Schott, B.8
-
13
-
-
0017310649
-
Improving the throughput of a pipeline by insertion of delays
-
J. H. Patel. Improving the throughput of a pipeline by insertion of delays. ACM SIGARCH Computer Architecture News, 4(4): 159-164, 1976.
-
(1976)
ACM SIGARCH Computer Architecture News
, vol.4
, Issue.4
, pp. 159-164
-
-
Patel, J.H.1
-
17
-
-
84893669641
-
Exploiting data forwarding to reduce the power budget of vliw embedded processors
-
M. Sami, D. Sciuto, C. Silvano, V. Zaccaria, and R. Zafalon. Exploiting data forwarding to reduce the power budget of vliw embedded processors. In Proceedings of DATE 2001, pages 252-257, 2001.
-
(2001)
Proceedings of DATE 2001
, pp. 252-257
-
-
Sami, M.1
Sciuto, D.2
Silvano, C.3
Zaccaria, V.4
Zafalon, R.5
-
18
-
-
27944443972
-
The black-box model for cryptographic primitives
-
C. Schnorr and S. Vaudenay. The black-box model for cryptographic primitives. Journal of Cryptology, 11(2):125-140, 1998.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.2
, pp. 125-140
-
-
Schnorr, C.1
Vaudenay, S.2
-
19
-
-
0037744606
-
On the hardware implementations of the sha-2(256,384,512) hash functions
-
N. Sklavos and O. Koufopavlou. On the hardware implementations of the sha-2(256,384,512) hash functions. In Proceedings of ISCAS 2003, 2003.
-
(2003)
Proceedings of ISCAS 2003
-
-
Sklavos, N.1
Koufopavlou, O.2
-
20
-
-
79955162305
-
An fpga based sha-256 processor
-
K. Ting, S. Yuen, K. Lee, and P. Leong. An fpga based sha-256 processor. In Proceedings of the FPL 2002 Conference, pages 577-585, 2002.
-
(2002)
Proceedings of the FPL 2002 Conference
, pp. 577-585
-
-
Ting, K.1
Yuen, S.2
Lee, K.3
Leong, P.4
-
21
-
-
19944425657
-
Collisions for hash functions md4, md5, haval-128 and ripemd
-
X. Wang, D. Feng, X. Lai, and H. Yu. Collisions for hash functions md4, md5, haval-128 and ripemd. In Rump Session of Crypto 2004, 2004.
-
(2004)
Rump Session of Crypto 2004
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Yu, H.4
|