메뉴 건너뛰기




Volumn , Issue , 2005, Pages 4086-4089

A Low-Power and High-Throughput implementation of the SHA-1 hash function

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION INTEGRITY; COMMUNICATION PROTOCOLS; HIGH THROUGHPUT IMPLEMENTATION; LOW POWER; NEW HIGH; POWER DISSIPATION; SIGNATURE AUTHENTICATION;

EID: 34548828765     PISSN: 02714310     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCAS.2005.1465529     Document Type: Conference Paper
Times cited : (30)

References (12)
  • 2
    • 67649113463 scopus 로고    scopus 로고
    • IEEE Std. 801.16-2001, IEEE Standard for Local and Metropolitan Area Networks, part 16, Air Interface for Fixed Broadband Wireless Access Systems, IEEE Press, 2001.
    • IEEE Std. 801.16-2001, IEEE Standard for Local and Metropolitan Area Networks, part 16, "Air Interface for Fixed Broadband Wireless Access Systems," IEEE Press, 2001.
  • 4
    • 67649123496 scopus 로고    scopus 로고
    • FIPS PUB 180-1, Secure Hash Standard (SHA-1), National Institute of Standards and Technology (NIST), 1995.
    • FIPS PUB 180-1, Secure Hash Standard (SHA-1), National Institute of Standards and Technology (NIST), 1995.
  • 8
    • 15744365992 scopus 로고    scopus 로고
    • Networking Data Integrity: High Speed Architectures and Hardware Implementations
    • N., Sklavos, E., Alexopoulos, and O., Koufopavlou, "Networking Data Integrity: High Speed Architectures and Hardware Implementations," IAJIT Journal, vol. 1, no. 0, pp. 54-59, 2003.
    • (2003) IAJIT Journal , vol.1 , Issue.0 , pp. 54-59
    • Sklavos, N.1    Alexopoulos, E.2    Koufopavlou, O.3
  • 9
    • 77956436878 scopus 로고    scopus 로고
    • A Hardware Implementation of MD-4 Family Hash Algorithms
    • S., Dominikus, "A Hardware Implementation of MD-4 Family Hash Algorithms," in Proc. of ICECS, pp. 1143-1146, 2002.
    • (2002) Proc. of ICECS , pp. 1143-1146
    • Dominikus, S.1
  • 10
    • 22944437962 scopus 로고    scopus 로고
    • VLSI Implementation of the Keyed-Hash Message Authentication Code for the Wireless Application Protocol
    • G., Selimis, N., Sklavos, and O., Koufopavlou, "VLSI Implementation of the Keyed-Hash Message Authentication Code for the Wireless Application Protocol," in Proc. of ICECS, pp. 24-27, 2003.
    • (2003) Proc. of ICECS , pp. 24-27
    • Selimis, G.1    Sklavos, N.2    Koufopavlou, O.3
  • 11
    • 22944431705 scopus 로고    scopus 로고
    • An Ultra High Speed Architecture for VLSI Implementation of Hash Functions
    • N., Sklavos, G., Dimitroulakos, and O., Koufopavlou, "An Ultra High Speed Architecture for VLSI Implementation of Hash Functions," in Proc. of ICECS, pp. 990-993, 2003.
    • (2003) Proc. of ICECS , pp. 990-993
    • Sklavos, N.1    Dimitroulakos, G.2    Koufopavlou, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.