-
1
-
-
84952955328
-
-
(XXXX)
-
ALMA Technologies (XXXX) Available at: http://www.alma-tech.com.
-
-
-
ALMA Technologies1
-
2
-
-
84952963859
-
-
(XXXX)
-
Amphion (XXXX) Available at: http://www.amphion.com/index.html.
-
-
-
Amphion1
-
4
-
-
0001849866
-
The Status of MD5 After a Recent Attack
-
Dobbertin, H. (1996) ‘The Status of MD5 After a Recent Attack’, RSALabs’ CryptoBytes, Vol. 2, No. 2.
-
(1996)
RSALabs’ CryptoBytes
, vol.2
, Issue.2
-
-
Dobbertin, H.1
-
6
-
-
84952973789
-
-
(XXXX)
-
FileSharing Talk (XXXX) Available at: http://www.filesharingtalk.com.
-
-
-
FileSharing Talk1
-
7
-
-
84952971976
-
Secure hash standard. federal information processing standard
-
US Department of Commerce, April
-
FIPS 180-1 (1995) ‘Secure hash standard. federal information processing standard’, (FIPS), Publication 180–1, NIST, US Department of Commerce, April.
-
(1995)
(FIPS), Publication 180–1, NIST
-
-
FIPS 180-11
-
8
-
-
84952971976
-
Digital signature standard federal information processing standard
-
(XXXX) US Department of Commerce
-
FIPS 186 (DSS) (XXXX) ‘Digital signature standard federal information processing standard’, (FIPS), Publication 180–1, NIST, US Department of Commerce.
-
(FIPS), Publication 180–1, NIST
-
-
FIPS 186 (DSS)1
-
9
-
-
84952964087
-
The keyed-hash message authentication code (HMAC) federal information processsing standard
-
(XXXX) US Department of Commerce
-
FIPS 198 (XXXX) ‘The keyed-hash message authentication code (HMAC) federal information processsing standard’, (FIPS), Publication 180–1, NIST, US Department of Commerce.
-
(FIPS), Publication 180–1, NIST
-
-
FIPS 1981
-
10
-
-
84945300922
-
Comparative analysis of the hardware implementationsof hash functions sha-1 and sha-512
-
A.H. Chan and V. Gligor (Eds) Springer-Verlag
-
Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., Lehman, T. and Schott, B. (2002) ‘Comparative analysis of the hardware implementationsof hash functions sha-1 and sha-512’, in A.H. Chan and V. Gligor (Eds). Information Security Conference, Springer-Verlag, pp.75–89.
-
(2002)
Information Security Conference
, pp. 75-89
-
-
Grembowski, T.1
Lien, R.2
Gaj, K.3
Nguyen, N.4
Bellows, P.5
Flidr, J.6
Lehman, T.7
Schott, B.8
-
11
-
-
84952973607
-
-
(XXXX)
-
Helion Technology Ltd (XXXX) Available at: http://www.heliontech.com/core4.htm.
-
-
-
Helion Technology Ltd1
-
13
-
-
84952955482
-
-
(XXXX)
-
Introduction to SSL (XXXX) Available at: http://docs.sun.com/source/816–6156-10/contents.htm.
-
-
-
Introduction to SSL1
-
16
-
-
84952974932
-
Hash functions: theory, attacks, and applications, Microsoft research
-
24 October
-
Mironov, I. (2005) ‘Hash functions: theory, attacks, and applications, Microsoft research’, Silicon Valley Campus, 24 October.
-
(2005)
Silicon Valley Campus
-
-
Mironov, I.1
-
17
-
-
0018543411
-
Password security: a case history
-
Morris, R. and Thompson, K. (1979) ‘Password security: a case history’, Communications of ACM, Vol. 22, No. 11, pp.594–597.
-
(1979)
Communications of ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
21
-
-
22944437962
-
VLSI Implementation of the keyed-hash message authentication code for the wireless application protocol
-
Selimis, G., Sklavos, N. and Koufopavlou, O. (2003) ‘VLSI Implementation of the keyed-hash message authentication code for the wireless application protocol’, IEEE International Conference on Electronics Circuits and Systems (ICECS’03), pp.24–27.
-
(2003)
IEEE International Conference on Electronics Circuits and Systems (ICECS’03)
, pp. 24-27
-
-
Selimis, G.1
Sklavos, N.2
Koufopavlou, O.3
-
22
-
-
84952960276
-
National Institute of standards and technology (NIST), Secure Hash Standard
-
(XXXX)
-
SHA-2 Standard (XXXX) ‘National Institute of standards and technology (NIST), Secure Hash Standard’, FIPS PUB 180–2.
-
FIPS PUB 180–2
-
-
SHA-2 Standard1
-
23
-
-
15744365992
-
Networking data integrity: high speed architectures and hardware implementations
-
Sklavos, N., Alexopoulos, E. and Koufopavlou, O. (2003a) ‘Networking data integrity: high speed architectures and hardware implementations’, IAJIT Journal, Vol. 1, No. 0, pp.54–59.
-
(2003)
IAJIT Journal
, vol.1
, Issue.0
, pp. 54-59
-
-
Sklavos, N.1
Alexopoulos, E.2
Koufopavlou, O.3
-
24
-
-
22944431705
-
An ultra high speed architecture for VLSI implementation of hash functions
-
Sklavos, N., Dimitroulakos, G. and Koufopavlou, O. (2003b) ‘An ultra high speed architecture for VLSI implementation of hash functions’, IEEE International Conference on Electronics Circuits and Systems (ICECS’03), pp.990–993.
-
(2003)
IEEE International Conference on Electronics Circuits and Systems (ICECS’03)
, pp. 990-993
-
-
Sklavos, N.1
Dimitroulakos, G.2
Koufopavlou, O.3
-
25
-
-
22944465281
-
Open mobile alliance (oma) security layer: architecture, implementation and performance evaluation of the integrity unit
-
Springer-Verlag
-
Sklavos, N., Kitsos, P., Alexopoulos, E. and Koufopavlou, O. (2004) ‘Open mobile alliance (oma) security layer: architecture, implementation and performance evaluation of the integrity unit’, New Generation Computing: Computing Paradigms and Computational Intelligence, Springer-Verlag.
-
(2004)
New Generation Computing: Computing Paradigms and Computational Intelligence
-
-
Sklavos, N.1
Kitsos, P.2
Alexopoulos, E.3
Koufopavlou, O.4
-
26
-
-
33746070680
-
-
(XXXX) National Institute of Standards and Technology (NIST)
-
SP800-77 (XXXX) Guide to IPSec VPN’s, National Institute of Standards and Technology (NIST).
-
Guide to IPSec VPN’s
-
-
SP800-771
-
27
-
-
33646754186
-
Finding collisions in the full SHA1
-
Wang, X., Yin, Y.L. and Yu, H. (2005) ‘Finding collisions in the full SHA1’, Crypto 2005.
-
(2005)
Crypto 2005
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
|