메뉴 건너뛰기




Volumn 2, Issue 3-4, 2007, Pages 228-238

Server side hashing core exceeding 3 Gbps of throughput

Author keywords

hardware implementation; hash functions; high throughput; precomputation; security; SHA 1

Indexed keywords


EID: 79951645452     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2007.013176     Document Type: Article
Times cited : (8)

References (27)
  • 1
    • 84952955328 scopus 로고    scopus 로고
    • (XXXX)
    • ALMA Technologies (XXXX) Available at: http://www.alma-tech.com.
    • ALMA Technologies1
  • 2
    • 84952963859 scopus 로고    scopus 로고
    • (XXXX)
    • Amphion (XXXX) Available at: http://www.amphion.com/index.html.
    • Amphion1
  • 3
    • 24744466328 scopus 로고    scopus 로고
    • Hash algorithms for cryptographic protocols: FPGA implementations
    • Diez, J.M., Bojanic, S., Carreras and Nieto-Taladriz, O. (2002) ‘Hash algorithms for cryptographic protocols: FPGA implementations’, TELEFOR.
    • (2002) TELEFOR
    • Diez, J.M.1    Bojanic, S.2    Carreras3    Nieto-Taladriz, O.4
  • 4
    • 0001849866 scopus 로고    scopus 로고
    • The Status of MD5 After a Recent Attack
    • Dobbertin, H. (1996) ‘The Status of MD5 After a Recent Attack’, RSALabs’ CryptoBytes, Vol. 2, No. 2.
    • (1996) RSALabs’ CryptoBytes , vol.2 , Issue.2
    • Dobbertin, H.1
  • 6
    • 84952973789 scopus 로고    scopus 로고
    • (XXXX)
    • FileSharing Talk (XXXX) Available at: http://www.filesharingtalk.com.
    • FileSharing Talk1
  • 7
    • 84952971976 scopus 로고    scopus 로고
    • Secure hash standard. federal information processing standard
    • US Department of Commerce, April
    • FIPS 180-1 (1995) ‘Secure hash standard. federal information processing standard’, (FIPS), Publication 180–1, NIST, US Department of Commerce, April.
    • (1995) (FIPS), Publication 180–1, NIST
    • FIPS 180-11
  • 8
    • 84952971976 scopus 로고    scopus 로고
    • Digital signature standard federal information processing standard
    • (XXXX) US Department of Commerce
    • FIPS 186 (DSS) (XXXX) ‘Digital signature standard federal information processing standard’, (FIPS), Publication 180–1, NIST, US Department of Commerce.
    • (FIPS), Publication 180–1, NIST
    • FIPS 186 (DSS)1
  • 9
    • 84952964087 scopus 로고    scopus 로고
    • The keyed-hash message authentication code (HMAC) federal information processsing standard
    • (XXXX) US Department of Commerce
    • FIPS 198 (XXXX) ‘The keyed-hash message authentication code (HMAC) federal information processsing standard’, (FIPS), Publication 180–1, NIST, US Department of Commerce.
    • (FIPS), Publication 180–1, NIST
    • FIPS 1981
  • 10
    • 84945300922 scopus 로고    scopus 로고
    • Comparative analysis of the hardware implementationsof hash functions sha-1 and sha-512
    • A.H. Chan and V. Gligor (Eds) Springer-Verlag
    • Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., Lehman, T. and Schott, B. (2002) ‘Comparative analysis of the hardware implementationsof hash functions sha-1 and sha-512’, in A.H. Chan and V. Gligor (Eds). Information Security Conference, Springer-Verlag, pp.75–89.
    • (2002) Information Security Conference , pp. 75-89
    • Grembowski, T.1    Lien, R.2    Gaj, K.3    Nguyen, N.4    Bellows, P.5    Flidr, J.6    Lehman, T.7    Schott, B.8
  • 11
    • 84952973607 scopus 로고    scopus 로고
    • (XXXX)
    • Helion Technology Ltd (XXXX) Available at: http://www.heliontech.com/core4.htm.
    • Helion Technology Ltd1
  • 13
    • 84952955482 scopus 로고    scopus 로고
    • (XXXX)
    • Introduction to SSL (XXXX) Available at: http://docs.sun.com/source/816–6156-10/contents.htm.
    • Introduction to SSL1
  • 16
    • 84952974932 scopus 로고    scopus 로고
    • Hash functions: theory, attacks, and applications, Microsoft research
    • 24 October
    • Mironov, I. (2005) ‘Hash functions: theory, attacks, and applications, Microsoft research’, Silicon Valley Campus, 24 October.
    • (2005) Silicon Valley Campus
    • Mironov, I.1
  • 17
    • 0018543411 scopus 로고
    • Password security: a case history
    • Morris, R. and Thompson, K. (1979) ‘Password security: a case history’, Communications of ACM, Vol. 22, No. 11, pp.594–597.
    • (1979) Communications of ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 20
  • 22
    • 84952960276 scopus 로고    scopus 로고
    • National Institute of standards and technology (NIST), Secure Hash Standard
    • (XXXX)
    • SHA-2 Standard (XXXX) ‘National Institute of standards and technology (NIST), Secure Hash Standard’, FIPS PUB 180–2.
    • FIPS PUB 180–2
    • SHA-2 Standard1
  • 23
    • 15744365992 scopus 로고    scopus 로고
    • Networking data integrity: high speed architectures and hardware implementations
    • Sklavos, N., Alexopoulos, E. and Koufopavlou, O. (2003a) ‘Networking data integrity: high speed architectures and hardware implementations’, IAJIT Journal, Vol. 1, No. 0, pp.54–59.
    • (2003) IAJIT Journal , vol.1 , Issue.0 , pp. 54-59
    • Sklavos, N.1    Alexopoulos, E.2    Koufopavlou, O.3
  • 26
    • 33746070680 scopus 로고    scopus 로고
    • (XXXX) National Institute of Standards and Technology (NIST)
    • SP800-77 (XXXX) Guide to IPSec VPN’s, National Institute of Standards and Technology (NIST).
    • Guide to IPSec VPN’s
    • SP800-771
  • 27
    • 33646754186 scopus 로고    scopus 로고
    • Finding collisions in the full SHA1
    • Wang, X., Yin, Y.L. and Yu, H. (2005) ‘Finding collisions in the full SHA1’, Crypto 2005.
    • (2005) Crypto 2005
    • Wang, X.1    Yin, Y.L.2    Yu, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.