Networking Data Integrity: High Speed Architectures and Hardware Implementations
暂无分享,去创建一个
[1] Michael Roe,et al. Performance of Block Ciphers and Hash Functions - One Year Later , 1994, FSE.
[2] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[3] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[4] Sandra Dominikus,et al. A hardware implementation of MD4-family hash algorithms , 2002, 9th International Conference on Electronics, Circuits and Systems.
[5] I. Yiakoumis,et al. Efficient Small-Sized Implementation of the Keyed-Hash Message Authentication Code , 2005, EUROCON 2005 - The International Conference on "Computer as a Tool".
[6] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[7] Paris Kitsos,et al. An efficient implementation of the digital signature algorithm , 2002, 9th International Conference on Electronics, Circuits and Systems.
[8] Howard M. Heys,et al. FPGA implementation of MD5 hash algorithm , 2001, Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555).
[9] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[10] Joseph D. Touch,et al. Performance analysis of MD5 , 1995, SIGCOMM '95.
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .