메뉴 건너뛰기




Volumn 3728 LNCS, Issue , 2005, Pages 591-600

Optimizing SHA-1 hash function for high throughput with a partial unrolling study

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE PORTABILITY; DATA ACQUISITION; ENERGY DISSIPATION; FUNCTIONS; NETWORK PROTOCOLS;

EID: 33646401086     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11556930_60     Document Type: Conference Paper
Times cited : (15)

References (12)
  • 1
    • 33646399267 scopus 로고    scopus 로고
    • Wireless application protocol, wireless transport layer security
    • WAP Forum, Wireless Application Protocol, Wireless Transport Layer Security, Architecture Specifications, 2003.
    • (2003) Architecture Specifications
  • 2
    • 77955321219 scopus 로고    scopus 로고
    • IEEE standard for local and metropolitan area networks, part 16
    • IEEE Std. 801.16-2001, IEEE Press
    • IEEE Std. 801.16-2001, IEEE Standard for Local and Metropolitan Area Networks, part 16, "Air Interface for Fixed Broadband Wireless Access Systems," IEEE Press, 2001.
    • (2001) Air Interface for Fixed Broadband Wireless Access Systems
  • 3
    • 0013091373 scopus 로고    scopus 로고
    • HMAC Standard, National Institute of Standards and Technology (NIST)
    • HMAC Standard, The Keyed-Hash Message Authentication Code, National Institute of Standards and Technology (NIST), 2003.
    • (2003) The Keyed-Hash Message Authentication Code
  • 4
    • 0003629991 scopus 로고
    • FIPS PUB 180-1, National Institute of Standards and Technology (NIST)
    • FIPS PUB 180-1, Secure Hash Standard (SHA-1), National Institute of Standards and Technology (NIST), 1995.
    • (1995) Secure Hash Standard (SHA-1)
  • 5
    • 0003195066 scopus 로고
    • The MD5 message digest algorithm
    • IETF Network Working Group, April
    • R. L., Rivest, The MD5 Message digest Algorithm, IETF Network Working Group, RFC 1321, April 1992.
    • (1992) RFC , vol.1321
    • Rivest, R.L.1
  • 6
    • 0001849866 scopus 로고    scopus 로고
    • The status of MD5 after a recent attack
    • Summer
    • H., Dobbertin, The Status of MD5 After a Recent Attack, RSALabs' CryptoBytes, Vol.2, No.2, Summer 1996.
    • (1996) RSALabs' CryptoBytes , vol.2 , Issue.2
    • Dobbertin, H.1
  • 8
    • 15744365992 scopus 로고    scopus 로고
    • Networking data integrity: High speed architectures and hardware implementations
    • N., Sklavos, E., Alexopoulos, and O., Koufopavlou, "Networking Data Integrity: High Speed Architectures and Hardware Implementations," IAJIT Journal, vol. 1, no. 0, pp. 54-59, 2003.
    • (2003) IAJIT Journal , vol.1 , pp. 54-59
    • Sklavos, N.1    Alexopoulos, E.2    Koufopavlou, O.3
  • 9
    • 77956436878 scopus 로고    scopus 로고
    • A hardware implementation of MD-4 family hash algorithms
    • S., Dominikus, "A Hardware Implementation of MD-4 Family Hash Algorithms," in Proc. of ICECS, pp. 1143-1146, 2002.
    • (2002) Proc. of ICECS , pp. 1143-1146
    • Dominikus, S.1
  • 10
    • 22944437962 scopus 로고    scopus 로고
    • VLSI implementation of the KeyedHash message authentication code for the wireless application protocol
    • G., Selimis, N., Sklavos, and O., Koufopavlou, "VLSI Implementation of the KeyedHash Message Authentication Code for the Wireless Application Protocol," in Proc. of ICECS, pp. 24-27, 2003.
    • (2003) Proc. of ICECS , pp. 24-27
    • Selimis, G.1    Sklavos, N.2    Koufopavlou, O.3
  • 11
    • 22944431705 scopus 로고    scopus 로고
    • An ultra high speed architecture for VLSI implementation of hash functions
    • N., Sklavos, G., Dimitroulakos, and O., Koufopavlou, "An Ultra High Speed Architecture for VLSI Implementation of Hash Functions," in Proc. of ICECS, pp. 990-993, 2003.
    • (2003) Proc. of ICECS , pp. 990-993
    • Sklavos, N.1    Dimitroulakos, G.2    Koufopavlou, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.