TL-SMD: Two layered secure message digest algorithm
暂无分享,去创建一个
[1] John Kelsey,et al. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition , 2011 .
[2] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[3] Hans Dobbertin,et al. RIPEMD with two-round compress function is not collision-free , 1997, Journal of Cryptology.
[4] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[5] Bart Preneel,et al. Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein , 2012, AFRICACRYPT.
[6] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[7] Francis M. Crowe,et al. Optimisation of the SHA-2 family of hash functions on FPGAs , 2006, IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures (ISVLSI'06).
[8] Odysseas G. Koufopavlou,et al. Implementation of the SHA-2 Hash Family Standard Using FPGAs , 2005, The Journal of Supercomputing.
[9] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[10] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[11] Constantinos E. Goutis,et al. Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study , 2005, PATMOS.
[12] Odysseas G. Koufopavlou,et al. On the hardware implementations of the SHA-2 (256, 384, 512) hash functions , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[13] Vincent Rijmen,et al. Update on SHA-1 , 2005, CT-RSA.
[14] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..