메뉴 건너뛰기




Volumn 6225 LNCS, Issue , 2010, Pages 279-293

Performance analysis of the SHA-3 candidates on exotic multi-core architectures

Author keywords

Cell Broadband Engine; Graphics Processing Unit; Hash function; SHA 3

Indexed keywords

BENCHMARKING; CELLS; COMPUTER GRAPHICS; CYTOLOGY; EMBEDDED SYSTEMS; ENGINES; FUNCTION EVALUATION; GRAPHICS PROCESSING UNIT; HASH FUNCTIONS; IMAGE CODING; PROGRAM PROCESSORS;

EID: 78049345430     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15031-9_19     Document Type: Conference Paper
Times cited : (15)

References (40)
  • 3
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • de Santis, A. ed, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: de Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92-111. Springer, Heidelberg (1995)
    • (1995) EUROCRYPT 1994. LNCS , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 72449210410 scopus 로고    scopus 로고
    • The intel AES instructions set and the SHA-3 candidates
    • Matsui, M. ed, Springer, Heidelberg
    • Benadjila, R., Billet, O., Gueron, S., Robshaw, M. J. B.: The Intel AES instructions set and the SHA-3 candidates. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 162-178. Springer, Heidelberg (2009)
    • (2009) ASIACRYPT 2009. LNCS , vol.5912 , pp. 162-178
    • Benadjila, R.1    Billet, O.2    Gueron, S.3    Robshaw, M.J.B.4
  • 8
    • 78049334714 scopus 로고    scopus 로고
    • MD5 chosen-prefix collisions on GPUs
    • Whitepaper
    • Bevand, M.: MD5 Chosen-Prefix Collisions on GPUs. Black Hat, Whitepaper (2009)
    • (2009) Black Hat
    • Bevand, M.1
  • 10
    • 78049346461 scopus 로고    scopus 로고
    • Multi-stream hashing on the playstation 3
    • Springer, Heidelberg to appear
    • Bos, J. W., Casati, N., Osvik, D. A.: Multi-Stream Hashing on the PlayStation 3. In: PARA 2008. LNCS. Springer, Heidelberg (to appear 2008), http://documents.epfl.ch/users/b/bo/bos/public/PARA2008.pdf
    • (2008) PARA 2008. LNCS
    • Bos, J.W.1    Casati, N.2    Osvik, D.A.3
  • 19
    • 68949216895 scopus 로고    scopus 로고
    • Practical symmetric key cryptography on modern graphics hardware
    • Harrison, O., Waldron, J.: Practical Symmetric Key Cryptography on Modern Graphics Hardware. In: USENIX Security Symposium, pp. 195-210 (2008)
    • (2008) USENIX Security Symposium , pp. 195-210
    • Harrison, O.1    Waldron, J.2
  • 20
    • 27644567646 scopus 로고    scopus 로고
    • Power efficient processor architecture and the cell processor
    • IEEE Computer Society, los Alamitos
    • Hofstee, H. P.: Power Efficient Processor Architecture and The Cell Processor. In: HPCA 2005, pp. 258-262. IEEE Computer Society, los Alamitos (2005)
    • (2005) HPCA 2005 , pp. 258-262
    • Hofstee, H.P.1
  • 25
    • 51049111938 scopus 로고    scopus 로고
    • CUDA compatible GPU as an efficient hardware accelerator for AES cryptography
    • November 2007, IEEE, los Alamitos
    • Manavski, S. A.: CUDA Compatible GPU as an Efficient Hardware Accelerator for AES Cryptography. In: ICSPC 2007, November 2007, pp. 65-68. IEEE, los Alamitos (2007)
    • (2007) ICSPC 2007 , pp. 65-68
    • Manavski, S.A.1
  • 26
    • 38849143105 scopus 로고    scopus 로고
    • Advances in password cracking
    • Marechal, S.: Advances in password cracking. Journal in Computer Virology 4(1), 73-81 (2008)
    • (2008) Journal in Computer Virology , vol.4 , Issue.1 , pp. 73-81
    • Marechal, S.1
  • 28
    • 0003629990 scopus 로고    scopus 로고
    • NIST, FIPS 180-2 August
    • NIST. Secure hash standard. FIPS 180-2 (August 2002), http://www.itl.nist.gov/fipspubs/fip180-2.htm
    • (2002) Secure Hash Standard
  • 29
    • 55849138936 scopus 로고    scopus 로고
    • Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family
    • NIST, Department of Commerce November
    • NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Technical report, Department of Commerce (November 2007), http://csrc.nist.gov/groups/ST/hash/documents/FR- Notice-Nov07.pdf
    • (2007) Technical Report
  • 32
    • 78049333508 scopus 로고    scopus 로고
    • NVIDIA. NVIDIA's Next Generation CUDA Compute Architecture: Fermi. Whitepaper September
    • NVIDIA. NVIDIA's Next Generation CUDA Compute Architecture: Fermi. Whitepaper (September 2009)
    • (2009)
  • 33
    • 77954721429 scopus 로고    scopus 로고
    • Fast software AES encryption
    • beyer, i. ed, Springer, Heidelberg
    • Osvik, D. A., Bos, J. W., Stefan, D., Canright, D.: Fast software AES encryption. In: beyer, i. (ed.) FSE 2010. LNCS, vol. 6147, pp. 75-93. Springer, Heidelberg (2010)
    • (2010) FSE 2010. LNCS , vol.6147 , pp. 75-93
    • Osvik, D.A.1    Bos, J.W.2    Stefan, D.3    Canright, D.4
  • 35
    • 78049345091 scopus 로고    scopus 로고
    • Status report on the first round of the SHA-3 cryptographic hash algorithm competition
    • NIST September
    • Regenscheid, A., Perlner, R., jen Chang, S., Kelsey, J., Nandi, M., Paul., S.: Status report on the first round of the SHA-3 cryptographic hash algorithm competition. Technical Report 7620, NIST (September 2009), http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/sha3NISTIR7620.pdf
    • (2009) Technical Report 7620
    • Regenscheid, A.1    Perlner, R.2    Chang, J.S.3    Kelsey, J.4    Nandi, M.5    Paul, S.6
  • 37
    • 70350346082 scopus 로고    scopus 로고
    • Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
    • Halevi, S. ed, Springer, Heidelberg
    • Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D. A., de Weger, B.: Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 55-69. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009. LNCS , vol.5677 , pp. 55-69
    • Stevens, M.1    Sotirov, A.2    Appelbaum, J.3    Lenstra, A.4    Molnar, D.5    Osvik, D.A.6    De Weger, B.7
  • 38
    • 51049119429 scopus 로고    scopus 로고
    • Exploiting the power of GPUs for asymmetric cryptography
    • Oswald, E., Rohatgi, P. eds., Springer, Heidelberg
    • Szerwinski, R., Güneysu, T.: Exploiting the power of GPUs for asymmetric cryptography. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 79-99. Springer, Heidelberg (2008)
    • (2008) CHES 2008. LNCS , vol.5154 , pp. 79-99
    • Szerwinski, R.1    Güneysu, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.