A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes

R Roman, C Alcaraz, J Lopez - Mobile Networks and Applications, 2007 - Springer
In a wireless sensor network environment, a sensor node is extremely constrained in terms
of hardware due to factors such as maximizing lifetime and minimizing physical size and …

ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS

A Satoh, T Inoue - Integration, 2007 - Elsevier
The hash functions MD5, RIPEMD-160, and SHA-1/224/256/384/512 were implemented by
using a 0.13-μm CMOS standard cell library with two synthesis options, area and speed …

Multi-mode operator for SHA-2 hash functions

R Glabb, L Imbert, G Jullien, A Tisserand… - Journal of Systems …, 2007 - Elsevier
We propose an improved implementation of the SHA-2 hash family, with minimal operator
latency and reduced hardware requirements. We also propose a high frequency version at …

Design and performance analysis of a unified, reconfigurable HMAC-Hash unit

E Khan, MW El-Kharashi, F Gebali… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Hash functions are important security primitives used for authentication and data integrity.
Among the most popular hash functions are MD5, SHA-1, and RIPEMD-160, which are all …

Revisions as an essential tool to maintain mathematical repositories

A Grabowski, C Schwarzweller - International Conference on …, 2007 - Springer
One major goal of Mathematical Knowledge Management is building extensive repositories,
in which the mathematical knowledge has been verified. It appears, however, that …

Long-term trusted preservation service using service interaction protocol and evidence records

AJ Blažič, T Klobučar, BD Jerman - Computer Standards & Interfaces, 2007 - Elsevier
The e-business and e-government processes demand to prove the existence of data at a
specific point of time and to demonstrate the integrity of the data since that time during long …

[引用][C] Network security essentials: applications and standards

W Stallings - 2007 - Pearson Education India

Hashchip: A shared-resource multi-hash function processor architecture on FPGA

TS Ganesh, MT Frederick, TSB Sudarshan, AK Somani - Integration, 2007 - Elsevier
The ubiquitous presence of mobile devices and the demand for better performance and
efficiency have motivated research into embedded implementations of cryptography …

Efficient negative databases from cryptographic hash functions

G Danezis, C Diaz, S Faust, E Käsper… - … on Information Security, 2007 - Springer
A negative database is a privacy-preserving storage system that allows to efficiently test if an
entry is present, but makes it hard to enumerate all encoded entries. We improve …

[图书][B] Information und Kommunikation: Grundlagen und Verfahren der Informationsübertragung

M Hufschmid - 2007 - books.google.com
Das vorliegende Buch gibt einen Einblick in die grundlegenden Verfahren, die für eine
effiziente und sichere Übertragung von Information notwendig sind. Es entstand im Rahmen …