-
1
-
-
48349094388
-
-
V. Klima, Finding MD5 collisions - A toy for a notebook. Cryptology ePrint Archive, 2005/075, 2005.
-
V. Klima, "Finding MD5 collisions - A toy for a notebook." Cryptology ePrint Archive, 2005/075, 2005.
-
-
-
-
2
-
-
33745171465
-
-
X. Wang, Y. L. Yin, and H. Yu, Finding collisions in the full SHA-1, in CRYPTO, V. Shoup, Ed. New York: Springer, 2005, 3621, Lecture Notes in Computer Science, pp. 17-36.
-
X. Wang, Y. L. Yin, and H. Yu, "Finding collisions in the full SHA-1," in CRYPTO, V. Shoup, Ed. New York: Springer, 2005, vol. 3621, Lecture Notes in Computer Science, pp. 17-36.
-
-
-
-
3
-
-
4043135942
-
-
National Institute of Standards and Technology NIST, MD
-
National Institute of Standards and Technology (NIST), MD, "FIPS 180-2, secure hash standard (SHS)," 2002.
-
(2002)
FIPS 180-2, secure hash standard (SHS)
-
-
-
4
-
-
3042615299
-
The design of a high speed ASIC unit for the hash function SHA-256 (384, 512)
-
L. Dadda, M. Macchetti, and J. Owen, "The design of a high speed ASIC unit for the hash function SHA-256 (384, 512)," in Proc. DATE, 2004, pp. 70-75.
-
(2004)
Proc. DATE
, pp. 70-75
-
-
Dadda, L.1
Macchetti, M.2
Owen, J.3
-
6
-
-
2942671000
-
An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512)
-
L. Dadda, M. Macchetti, and J. Owen, D. Garrett, J. Lach, and C. A. Zukowski, Eds
-
L. Dadda, M. Macchetti, and J. Owen, D. Garrett, J. Lach, and C. A. Zukowski, Eds., "An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512)," in Proc. ACM Great Lakes Symp. VLSI, 2004, pp. 421-425.
-
(2004)
Proc. ACM Great Lakes Symp. VLSI
, pp. 421-425
-
-
-
7
-
-
84945300922
-
Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512
-
ISC, A. H. Chan and V. D. Gligor, Eds. New York: Springer
-
T. Grembowski, R. Lien, K. Gaj, N. Nguyen, P. Bellows, J. Flidr, T. Lehman, and B. Schott, "Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512," in ISC, A. H. Chan and V. D. Gligor, Eds. New York: Springer, 2002, vol. 2433, Lecture Notes in Computer Science, pp. 75-89.
-
(2002)
Lecture Notes in Computer Science
, vol.2433
, pp. 75-89
-
-
Grembowski, T.1
Lien, R.2
Gaj, K.3
Nguyen, N.4
Bellows, P.5
Flidr, J.6
Lehman, T.7
Schott, B.8
-
9
-
-
15544371957
-
Implementation of the SHA-2 hash family standard using FPGAs
-
N. Sklavos and O. Koufopavlou, "Implementation of the SHA-2 hash family standard using FPGAs," J. Supercomput., vol. 31, pp. 227-248, 2005.
-
(2005)
J. Supercomput
, vol.31
, pp. 227-248
-
-
Sklavos, N.1
Koufopavlou, O.2
-
10
-
-
79955162305
-
-
K. K. Ting, S. C. L. Yuen, K.-H. Lee, and P. H. W. Leong, An FPGA based SHA-256 processor, in FPL, M. Glesner, P. Zipf, and M. Renovell, Eds. New York: Springer, 2002, 2438, Lecture Notes in Computer Science, pp. 577-585.
-
K. K. Ting, S. C. L. Yuen, K.-H. Lee, and P. H. W. Leong, "An FPGA based SHA-256 processor," in FPL, M. Glesner, P. Zipf, and M. Renovell, Eds. New York: Springer, 2002, vol. 2438, Lecture Notes in Computer Science, pp. 577-585.
-
-
-
-
11
-
-
35048818496
-
A 1 Gbit/s partially unrolled architecture of hash functions SHA-1 and SHA-512
-
R. Lien, T. Grembowski, and K. Gaj, "A 1 Gbit/s partially unrolled architecture of hash functions SHA-1 and SHA-512," in Proc. CT-RSA, 2004, pp. 324-338.
-
(2004)
Proc. CT-RSA
, pp. 324-338
-
-
Lien, R.1
Grembowski, T.2
Gaj, K.3
-
12
-
-
15744365992
-
Networking data integrity: High speed architectures and hardware implementations
-
N. Sklavos, E. Alexopoulos, and O. G. Koufopavlou, "Networking data integrity: High speed architectures and hardware implementations," Int. Arab J. Inf. Technol., vol. 1, pp. 54-59, 2003.
-
(2003)
Int. Arab J. Inf. Technol
, vol.1
, pp. 54-59
-
-
Sklavos, N.1
Alexopoulos, E.2
Koufopavlou, O.G.3
-
13
-
-
33749335334
-
Optimisation of the SHA-2 family of hash functions on FPGAs
-
R. P. McEvoy, F. M. Crowe, C. C. Murphy, and W. P. Marnane, "Optimisation of the SHA-2 family of hash functions on FPGAs," in Proc. IEEE Comput. Soc. Annu. Symp. Emerging VLSI Technol. Arch. (ISVLSI), 2006, pp. 317-322.
-
(2006)
Proc. IEEE Comput. Soc. Annu. Symp. Emerging VLSI Technol. Arch. (ISVLSI)
, pp. 317-322
-
-
McEvoy, R.P.1
Crowe, F.M.2
Murphy, C.C.3
Marnane, W.P.4
-
14
-
-
33646401086
-
-
H. E. Michail, A. P. Kakarountas, G. N. Selimis, and C. E. Goutis, Optimizing SHA-1 hash function for high throughput with a partial unrolling study, in PATMOS, V. Paliouras, J. Vounckx, and D. Verkest, Eds. New York: Springer, 2005, 3728, Lecture Notes in Computer Science, pp. 591-600.
-
H. E. Michail, A. P. Kakarountas, G. N. Selimis, and C. E. Goutis, "Optimizing SHA-1 hash function for high throughput with a partial unrolling study," in PATMOS, V. Paliouras, J. Vounckx, and D. Verkest, Eds. New York: Springer, 2005, vol. 3728, Lecture Notes in Computer Science, pp. 591-600.
-
-
-
-
15
-
-
33746706915
-
Rescheduling for optimized SHA-1 calculation
-
Jul
-
R. Chaves, G. Kuzmanov, L. A. Sousa, and S. Vassiliadis, "Rescheduling for optimized SHA-1 calculation," in Proc. SAMOS Workshop Comput. Syst. Arch. Model. Simulation, Jul. 2006, pp. 425-434.
-
(2006)
Proc. SAMOS Workshop Comput. Syst. Arch. Model. Simulation
, pp. 425-434
-
-
Chaves, R.1
Kuzmanov, G.2
Sousa, L.A.3
Vassiliadis, S.4
-
16
-
-
33750729555
-
Improving SHA-2 hardware implementations
-
Oct
-
R. Chaves, G. Kuzmanov, L. A. Sousa, and S. Vassiliadis, "Improving SHA-2 hardware implementations," in Proc. Workshop Cryptograph. Hardw. Embedded Syst. (CHES), Oct. 2006, pp. 298-310.
-
(2006)
Proc. Workshop Cryptograph. Hardw. Embedded Syst. (CHES)
, pp. 298-310
-
-
Chaves, R.1
Kuzmanov, G.2
Sousa, L.A.3
Vassiliadis, S.4
-
17
-
-
8744241430
-
The MOLEN polymorphic processor
-
Nov
-
S. Vassiliadis, S. Wong, G. N. Gaydadjiev, K. Beitels, G. Kuzmanov, and E. M. Panainte, "The MOLEN polymorphic processor," IEEE Trans. Comput., vol. 53, no. 11, pp. 1363-1375, Nov. 2004.
-
(2004)
IEEE Trans. Comput
, vol.53
, Issue.11
, pp. 1363-1375
-
-
Vassiliadis, S.1
Wong, S.2
Gaydadjiev, G.N.3
Beitels, K.4
Kuzmanov, G.5
Panainte, E.M.6
-
18
-
-
48349123571
-
-
National Institute of Standards and Technology NIST, MD, FIPS 180
-
National Institute of Standards and Technology (NIST), MD, "Announcing the standard for secure hash standard," FIPS 180, 1993.
-
(1993)
Announcing the standard for secure hash standard
-
-
-
19
-
-
60949097636
-
-
National Institute of Standards and Technology NIST
-
National Institute of Standards and Technology (NIST), "The keyedhash message authentication code (HMAC)," FIPS 198, 2002.
-
The keyedhash message authentication code (HMAC)
, vol.FIPS 198
, pp. 2002
-
-
-
20
-
-
48349087129
-
Woodcliff Lake, NJ
-
CAST, Online, Available
-
CAST, Woodcliff Lake, NJ, "SHA-1 secure hash algorithm, cryptoprocessor core," 2005 [Online]. Available: http://http://www.cast- inc.com/
-
(2005)
SHA-1 secure hash algorithm, cryptoprocessor core
-
-
-
22
-
-
0037744606
-
On the hardware implementation of the SHA-2 (256,384,512) hash functions
-
N. Sklavos and O. Koufopavlou, "On the hardware implementation of the SHA-2 (256,384,512) hash functions," in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), 2003, pp. 25-28.
-
(2003)
Proc. IEEE Int. Symp. Circuits Syst. (ISCAS)
, pp. 25-28
-
-
Sklavos, N.1
Koufopavlou, O.2
-
24
-
-
84949189232
-
The MOLEN ρμ-coded processor
-
Aug
-
S. Vassiliadis, S. Wong, and S. D. Cotofana, "The MOLEN ρμ-coded processor," in Proc. 11th Int. Conf. Field-Program. Logic Appl. (FPL), Aug. 2001, vol. 2147, pp. 275-285.
-
(2001)
Proc. 11th Int. Conf. Field-Program. Logic Appl. (FPL)
, vol.2147
, pp. 275-285
-
-
Vassiliadis, S.1
Wong, S.2
Cotofana, S.D.3
-
25
-
-
48149104394
-
Reconfigurable memory based AES co-processor
-
Apr
-
R. Chaves, G. Kuzmanov, S. Vassiliadis, and L. A. Sousa, "Reconfigurable memory based AES co-processor," in Proc. 13th Reconfigurable Arch. Workshop (RAW), Apr. 2006, pp. 192-192.
-
(2006)
Proc. 13th Reconfigurable Arch. Workshop (RAW)
, pp. 192-192
-
-
Chaves, R.1
Kuzmanov, G.2
Vassiliadis, S.3
Sousa, L.A.4
|