메뉴 건너뛰기




Volumn 53, Issue 2-3, 2007, Pages 127-138

Multi-mode operator for SHA-2 hash functions

Author keywords

FPGA; Hash function; Multi mode operator; SHA 2 family

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER HARDWARE; FUNCTIONS; SERVERS;

EID: 33846253665     PISSN: 13837621     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sysarc.2006.09.006     Document Type: Article
Times cited : (46)

References (11)
  • 2
    • 33846249181 scopus 로고    scopus 로고
    • Ronald L. Rivest, The MD5 Message-Digest Algorithm, Internet informational RFC 1321, April 1992.
  • 3
    • 84958957924 scopus 로고    scopus 로고
    • H. Dobbertin, A. Bosselaers, B. Preneel, RIPEMD-160: a strengthened version of RIPEMD, in: IWFSE: International Workshop on Fast Software Encryption, LNCS, 1996.
  • 4
    • 33846236790 scopus 로고    scopus 로고
    • Vincent Rijmen, Paulo S.L.M. Barreto, The WHIRLPOOL hash function, World-Wide Web document, 2001.
  • 5
    • 33846234609 scopus 로고    scopus 로고
    • Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu, Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive, Report 2004/199, 2004, p. 4.
  • 6
    • 33846189686 scopus 로고    scopus 로고
    • Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, Finding collisions in the full SHA-1, Shandong University, Technical Report, June 2005.
  • 7
    • 33846250748 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, FIPS PUB 180-1: Secure Hash Standard, Gaithersburg, MD, USA, NIST, April 1995.
  • 8
    • 33846221388 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, FIPS PUB 180-2: Secure Hash Standard, Gaithersburg, MD, USA, NIST, august 2002.
  • 10
    • 2442577898 scopus 로고    scopus 로고
    • M. McLoone, J.V. McCanny, Efficient single-chip implementation of SHA-384 & SHA-512, in: IEEE Proceedings of the International Conference on Field-Programmable Technology (FTP), 2002, pp. 311-314.
  • 11
    • 33846245436 scopus 로고    scopus 로고
    • Grembowski, Lien, Gaj, Nguyen, Bellows, Flidr, Lehman, Schott, Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512, in: ISW: International Workshop on Information Security, LNCS 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.