Divide-and-concatenate: an architecture level optimization technique for universal hash functions
暂无分享,去创建一个
Ramesh Karri | Bo Yang | David A. McGrew | D. McGrew | R. Karri | Bo Yang
[1] Sarvar Patel,et al. SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions , 1999, CRYPTO.
[2] David McGrew. The Truncated Multi-Modular Hash Function (TMMH) , 2001 .
[3] Miodrag Potkonjak,et al. Throughput optimization of general non-linear computations , 1999, 1999 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (Cat. No.99CH37051).
[4] G. Goto,et al. A 54*54-b regularly structured tree multiplier , 1992 .
[5] Hugo De Man,et al. Combined hardware selection and pipelining in high performance data-path design , 1990, Proceedings., 1990 IEEE International Conference on Computer Design: VLSI in Computers and Processors.
[6] Christof Paar,et al. An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists , 2001, IEEE Trans. Very Large Scale Integr. Syst..
[7] R. Ravi,et al. Optimal Circuits for Parallel Multipliers , 1998, IEEE Trans. Computers.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Hugo Krawczyk,et al. MMH: Software Message Authentication in the Gbit/Second Rates , 1997, FSE.
[10] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[11] John Black,et al. Message authentication codes , 2000 .
[12] Soha Hassoun,et al. Architectural retiming: pipelining latency-constrained circuits , 1996, DAC '96.
[13] John W. Lockwood,et al. Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.
[14] David Hung-Chang Du,et al. An efficient parallel critical path algorithm , 1991, DAC '91.
[15] Keshab K. Parhi. A systematic approach for design of digit-serial signal processing architectures , 1991 .
[16] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.
[17] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[18] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[19] Miodrag Potkonjak,et al. Critical Path Minimization Using Retiming and Algebraic Speed-Up , 1993, 30th ACM/IEEE Design Automation Conference.
[20] Daniel Gajski,et al. An effective methodology for functional pipelining , 1992, ICCAD.
[21] H. T. Kung,et al. A Regular Layout for Parallel Adders , 1982, IEEE Transactions on Computers.
[22] Hugo De Man,et al. Combined hardware selection and pipelining in high-performance data-path design , 1992, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..