-
2
-
-
77955999819
-
-
Aumasson, J.-P., Henzen, L., Meier, W., Phan, R. C.-W.: SHA-3 proposal BLAKE (2008)
-
(2008)
SHA-3 Proposal BLAKE
-
-
Aumasson, J.-P.1
Henzen, L.2
Meier, W.3
Phan, R.C.-W.4
-
3
-
-
84948986458
-
Optimal asymmetric encryption
-
de Santis, A. ed, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: de Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92-111. Springer, Heidelberg (1995)
-
(1995)
EUROCRYPT 1994. LNCS
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
77949576248
-
-
Benadjila, R., Billet, O., Gilbert, H., Macario-Rat, G., Peyrin, T., Robshaw, M., Seurin, Y.: SHA-3 Proposal: ECHO (2009)
-
(2009)
SHA-3 Proposal: ECHO
-
-
Benadjila, R.1
Billet, O.2
Gilbert, H.3
Macario-Rat, G.4
Peyrin, T.5
Robshaw, M.6
Seurin, Y.7
-
5
-
-
72449210410
-
The intel AES instructions set and the SHA-3 candidates
-
Matsui, M. ed, Springer, Heidelberg
-
Benadjila, R., Billet, O., Gueron, S., Robshaw, M. J. B.: The Intel AES instructions set and the SHA-3 candidates. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 162-178. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009. LNCS
, vol.5912
, pp. 162-178
-
-
Benadjila, R.1
Billet, O.2
Gueron, S.3
Robshaw, M.J.B.4
-
7
-
-
70350384969
-
-
Bertoni, G., Daemen, J., Peeters, M., Assche, G. V.: Keccak specifications (2009)
-
(2009)
Keccak Specifications
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Assche, G.V.4
-
8
-
-
78049334714
-
MD5 chosen-prefix collisions on GPUs
-
Whitepaper
-
Bevand, M.: MD5 Chosen-Prefix Collisions on GPUs. Black Hat, Whitepaper (2009)
-
(2009)
Black Hat
-
-
Bevand, M.1
-
10
-
-
78049346461
-
Multi-stream hashing on the playstation 3
-
Springer, Heidelberg to appear
-
Bos, J. W., Casati, N., Osvik, D. A.: Multi-Stream Hashing on the PlayStation 3. In: PARA 2008. LNCS. Springer, Heidelberg (to appear 2008), http://documents.epfl.ch/users/b/bo/bos/public/PARA2008.pdf
-
(2008)
PARA 2008. LNCS
-
-
Bos, J.W.1
Casati, N.2
Osvik, D.A.3
-
11
-
-
78049352228
-
-
Bresson, E., Canteaut, A., Chevallier-Mames, B., Clavier, C., Fuhr, T., Gouget, A., Icart, T., Misarsky, J.-F., Naya-Plasencia, M., Paillier, P., Pornin, T., Reinhard, J.-R., Thuillet, C., Videau, M.: The Hash Function Shabal (2008)
-
(2008)
The Hash Function Shabal
-
-
Bresson, E.1
Canteaut, A.2
Chevallier-Mames, B.3
Clavier, C.4
Fuhr, T.5
Gouget, A.6
Icart, T.7
Misarsky, J.-F.8
Naya-Plasencia, M.9
Paillier, P.10
Pornin, T.11
Reinhard, J.-R.12
Thuillet, C.13
Videau, M.14
-
13
-
-
34548753903
-
-
November
-
Chen, T., Raghavan, R., Dale, J., Iwata, E.: Cell broadband engine architecture and its first implementation: A performance view (November 2005), http://www.ibm.com/developerworks/power/library/pa-cellperf/
-
(2005)
Cell. Broadband Engine Architecture and its First Implementation: A Performance View
-
-
Chen, T.1
Raghavan, R.2
Dale, J.3
Iwata, E.4
-
15
-
-
76549089345
-
-
Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., Walker, J.: The Skein Hash Function Family (2009)
-
(2009)
The Skein Hash Function Family
-
-
Ferguson, N.1
Lucks, S.2
Schneier, B.3
Whiting, D.4
Bellare, M.5
Kohno, T.6
Callas, J.7
Walker, J.8
-
16
-
-
68849109980
-
-
Gauravaram, P., Knudsen, L. R., Matusiewicz, K., Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S. S.: Grøstl-a SHA-3 candidate (2008)
-
(2008)
Grøstl-a SHA-3 Candidate
-
-
Gauravaram, P.1
Knudsen, L.R.2
Matusiewicz, K.3
Mendel, F.4
Rechberger, C.5
Schläffer, M.6
Thomsen, S.S.7
-
17
-
-
78049330815
-
-
Gligoroski, D., Klima, V., Knapskog, S. J., El-Hadedy, M., Amundsen, J., Mjo lsnes, S. F.: Cryptographic Hash Function BLUE MIDNIGHT WISH (2009)
-
(2009)
Cryptographic Hash Function BLUE MIDNIGHT WISH
-
-
Gligoroski, D.1
Klima, V.2
Knapskog, S.J.3
El-Hadedy, M.4
Amundsen, J.5
Lsnes, M.S.F.6
-
19
-
-
68949216895
-
Practical symmetric key cryptography on modern graphics hardware
-
Harrison, O., Waldron, J.: Practical Symmetric Key Cryptography on Modern Graphics Hardware. In: USENIX Security Symposium, pp. 195-210 (2008)
-
(2008)
USENIX Security Symposium
, pp. 195-210
-
-
Harrison, O.1
Waldron, J.2
-
20
-
-
27644567646
-
Power efficient processor architecture and the cell processor
-
IEEE Computer Society, los Alamitos
-
Hofstee, H. P.: Power Efficient Processor Architecture and The Cell Processor. In: HPCA 2005, pp. 258-262. IEEE Computer Society, los Alamitos (2005)
-
(2005)
HPCA 2005
, pp. 258-262
-
-
Hofstee, H.P.1
-
22
-
-
0003729341
-
HMAC: Keyed-hashing for message authentication
-
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. RFC 2104, IETF (1997)
-
(1997)
RFC 2104, IETF
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
25
-
-
51049111938
-
CUDA compatible GPU as an efficient hardware accelerator for AES cryptography
-
November 2007, IEEE, los Alamitos
-
Manavski, S. A.: CUDA Compatible GPU as an Efficient Hardware Accelerator for AES Cryptography. In: ICSPC 2007, November 2007, pp. 65-68. IEEE, los Alamitos (2007)
-
(2007)
ICSPC 2007
, pp. 65-68
-
-
Manavski, S.A.1
-
26
-
-
38849143105
-
Advances in password cracking
-
Marechal, S.: Advances in password cracking. Journal in Computer Virology 4(1), 73-81 (2008)
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.1
, pp. 73-81
-
-
Marechal, S.1
-
28
-
-
0003629990
-
-
NIST, FIPS 180-2 August
-
NIST. Secure hash standard. FIPS 180-2 (August 2002), http://www.itl.nist.gov/fipspubs/fip180-2.htm
-
(2002)
Secure Hash Standard
-
-
-
29
-
-
55849138936
-
Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family
-
NIST, Department of Commerce November
-
NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Technical report, Department of Commerce (November 2007), http://csrc.nist.gov/groups/ST/hash/documents/FR- Notice-Nov07.pdf
-
(2007)
Technical Report
-
-
-
32
-
-
78049333508
-
-
NVIDIA. NVIDIA's Next Generation CUDA Compute Architecture: Fermi. Whitepaper September
-
NVIDIA. NVIDIA's Next Generation CUDA Compute Architecture: Fermi. Whitepaper (September 2009)
-
(2009)
-
-
-
33
-
-
77954721429
-
Fast software AES encryption
-
beyer, i. ed, Springer, Heidelberg
-
Osvik, D. A., Bos, J. W., Stefan, D., Canright, D.: Fast software AES encryption. In: beyer, i. (ed.) FSE 2010. LNCS, vol. 6147, pp. 75-93. Springer, Heidelberg (2010)
-
(2010)
FSE 2010. LNCS
, vol.6147
, pp. 75-93
-
-
Osvik, D.A.1
Bos, J.W.2
Stefan, D.3
Canright, D.4
-
35
-
-
78049345091
-
Status report on the first round of the SHA-3 cryptographic hash algorithm competition
-
NIST September
-
Regenscheid, A., Perlner, R., jen Chang, S., Kelsey, J., Nandi, M., Paul., S.: Status report on the first round of the SHA-3 cryptographic hash algorithm competition. Technical Report 7620, NIST (September 2009), http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/sha3NISTIR7620.pdf
-
(2009)
Technical Report 7620
-
-
Regenscheid, A.1
Perlner, R.2
Chang, J.S.3
Kelsey, J.4
Nandi, M.5
Paul, S.6
-
37
-
-
70350346082
-
Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
-
Halevi, S. ed, Springer, Heidelberg
-
Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D. A., de Weger, B.: Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 55-69. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 55-69
-
-
Stevens, M.1
Sotirov, A.2
Appelbaum, J.3
Lenstra, A.4
Molnar, D.5
Osvik, D.A.6
De Weger, B.7
-
38
-
-
51049119429
-
Exploiting the power of GPUs for asymmetric cryptography
-
Oswald, E., Rohatgi, P. eds., Springer, Heidelberg
-
Szerwinski, R., Güneysu, T.: Exploiting the power of GPUs for asymmetric cryptography. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 79-99. Springer, Heidelberg (2008)
-
(2008)
CHES 2008. LNCS
, vol.5154
, pp. 79-99
-
-
Szerwinski, R.1
Güneysu, T.2
-
39
-
-
33751401086
-
The circuit design of the synergistic processor element of a CELL processor
-
DOI 10.1109/ICCAD.2005.1560049, 1560049, Proceedings of theICCAD-2005: International Conference on Computer-Aided Design
-
Takahashi, O., Cook, R., Cottier, S., Dhong, S. H., Flachs, B., Hirairi, K., Kawasumi, A., Murakami, H., Noro, H., Oh, H., Onish, S., Pille, J., Silberman, J.: The circuit design of the synergistic processor element of a Cell processor. In: ICCAD 2005, pp. 111-117. IEEE Computer Society, los Alamitos (2005) (Pubitemid 44815705)
-
(2005)
IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD
, vol.2005
, pp. 111-117
-
-
Takahashi, O.1
Cook, R.2
Cottier, S.3
Dhong, S.H.4
Flachs, B.5
Hirairi, K.6
Kawasumi, A.7
Murakami, H.8
Murakami, H.9
Noro, H.10
Oh, H.11
Onishi, S.12
Pille, J.13
Silberman, J.14
|