Authentication with RIPEMD-160 and Other Alternatives: A Hardware Design Perspective
暂无分享,去创建一个
Harris E. Michail | Angeliki Kritikakou | Constantinos E. Goutis | Andreas Gregoriades | Vasileios I. Kelefouras | George Athanasiou
[1] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[2] Sandra Dominikus,et al. A hardware implementation of MD4-family hash algorithms , 2002, 9th International Conference on Electronics, Circuits and Systems.
[3] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[4] Larry Loeb. Secure Electronic Transactions Introduction and Technical Reference , 1998 .
[5] Fayez Gebali,et al. An FPGA design of a unified hash engine for IPSec authentication , 2005, Fifth International Workshop on System-on-Chip for Real-Time Applications (IWSOC'05).
[6] Stephen A. Thomas,et al. SSL & TLS Essentials: Securing the Web , 2000 .
[7] Odysseas G. Koufopavlou,et al. On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps , 2005, Comput. Electr. Eng..
[8] Ilya Mironov,et al. Hash functions: Theory, attacks, and applications , 2005 .
[9] Kevin S. McCurley. A fast portable implementation of the Secure Hash Algorithm, III. , 1992 .
[10] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[11] Joos Vandewalle,et al. Fast Hashing on the Pentium , 1996, CRYPTO.
[12] Ingrid Verbauwhede,et al. A 21.54 Gbits/s fully pipelined AES processor on FPGA , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[13] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[14] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[15] Mitsuru Matsui,et al. Performance Analysis and Parallel Implementation of Dedicated Hash Functions , 2002, EUROCRYPT.
[16] Morris J. Dworkin,et al. SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .
[17] Paul C. van Oorschot,et al. Hardware-assisted circumvention of self-hashing software tamper resistance , 2005, IEEE Transactions on Dependable and Secure Computing.
[18] Akashi Satoh,et al. ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[19] Tung-Sang Ng,et al. A unified architecture of MD5 and RIPEMD-160 hash algorithms , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).