Non-crypto Hardware Hash Functions for High Performance Networking ASICs
暂无分享,去创建一个
[1] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[2] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[3] Peter K. Pearson,et al. Fast hashing of variable-length text strings , 1990, CACM.
[4] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[5] Donald E. Knuth,et al. The Art of Computer Programming, Vol. 3: Sorting and Searching , 1974 .
[6] Bart Preneel,et al. Hash functions , 2005, Encyclopedia of Cryptography and Security.
[7] J. Rexford,et al. Security vulnerabilities and solutions for packet sampling , 2007, 2007 IEEE Sarnoff Symposium.
[8] José María Sierra,et al. The strict avalanche criterion randomness test , 2005, Math. Comput. Simul..
[9] M. Molinaa,et al. A Comparative Experimental Study of Hash Functions Applied to Packet Sampling , 2005 .
[10] Akashi Satoh,et al. ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[11] David Newman,et al. Hash and Stuffing: Overlooked Factors in Network Device Benchmarking , 2007, RFC.
[12] Tanja Zseby,et al. Empirical evaluation of hash functions for multipoint measurements , 2008, CCRV.
[13] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..