The hash functions MD5, RIPEMD-160, and SHA-1/224/256/384/512 were implemented by using a 0.13-μm CMOS standard cell library with two synthesis options, area and speed …
R Glabb, L Imbert, G Jullien, A Tisserand… - Journal of Systems …, 2007 - Elsevier
We propose an improved implementation of the SHA-2 hash family, with minimal operator latency and reduced hardware requirements. We also propose a high frequency version at …
Hash functions are important security primitives used for authentication and data integrity. Among the most popular hash functions are MD5, SHA-1, and RIPEMD-160, which are all …
One major goal of Mathematical Knowledge Management is building extensive repositories, in which the mathematical knowledge has been verified. It appears, however, that …
AJ Blažič, T Klobučar, BD Jerman - Computer Standards & Interfaces, 2007 - Elsevier
The e-business and e-government processes demand to prove the existence of data at a specific point of time and to demonstrate the integrity of the data since that time during long …
The ubiquitous presence of mobile devices and the demand for better performance and efficiency have motivated research into embedded implementations of cryptography …
A negative database is a privacy-preserving storage system that allows to efficiently test if an entry is present, but makes it hard to enumerate all encoded entries. We improve …
Das vorliegende Buch gibt einen Einblick in die grundlegenden Verfahren, die für eine effiziente und sichere Übertragung von Information notwendig sind. Es entstand im Rahmen …