Parallel white noise generation on a GPU via cryptographic hash

S Tzeng, LY Wei - Proceedings of the 2008 symposium on Interactive 3D …, 2008 - dl.acm.org
A good random number generator is essential for many graphics applications. As more such
applications move onto parallel processing, it is vital that a good parallel random number …

[图书][B] Information security: theory and practice

DR Patel - 2008 - books.google.com
This book offers a comprehensive introduction to the fundamental aspects of Information
Security (including Web, Networked World, Systems, Applications, and Communication …

A top-down design methodology for ultrahigh-performance hashing cores

H Michail, A Kakarountas, A Milidonis… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Many cryptographic primitives that are used in cryptographic schemes and security protocols
such as SET, PKI, IPSec, and VPNs utilize hash functions, which form a special family of …

The hash function family LAKE

JP Aumasson, W Meier, RCW Phan - Fast Software Encryption: 15th …, 2008 - Springer
This paper advocates a new hash function family based on the HAIFA framework, inheriting
built-in randomized hashing and higher security guarantees than the Merkle-Damgård …

[图书][B] Kryptographie und IT-Sicherheit

J Swoboda, M Pramateftakis, S Spitz, J Swoboda - 2008 - Springer
Dieses Buch entstand auf der Basis von Vorlesungen über Kryptographie und angewandte
IT-Sicherheit, die seit Jahren in der Elektrotechnik und Informationstechnik (EI) der …

[PDF][PDF] Practical Secure Function Evaluation.

T Schneider - Informatiktage, 2008 - download.hrz.tu-darmstadt.de
This thesis focuses on practical aspects of general two-party Secure Function Evaluation
(SFE). We give a new SFE protocol that allows free evaluation of XOR gates and is provably …

On the high-throughput implementation of ripemd-160 hash algorithm

M Knezzevic, K Sakiyama, YK Lee… - 2008 International …, 2008 - ieeexplore.ieee.org
In this paper we present two new architectures of the RIPEMD-160 hash algorithm for high
throughput implementations. The first architecture achieves the iteration bound of RIPEMD …

[PDF][PDF] Analyse de fonctions de hachage cryptographiques

T Peyrin - 2008 - thomaspeyrin.github.io
Je souhaite adresser mes premiers remerciements à Henri Gilbert, qui a accepté de
m'encadrer tout au long de mon travail de recherche. Son amabilité, sa patience et sa …

[图书][B] Studies on high-speed hardware implementation of cryptographic algorithms

K Järvinen - 2008 - aaltodoc.aalto.fi
Cryptographic algorithms are ubiquitous in modern communication systems where they
have a central role in ensuring information security. This thesis studies efficient …

On statistical analysis of synchronous stream ciphers

M Sönmez Turan - 2008 - open.metu.edu.tr
Synchronous stream ciphers constitute an important class of symmetric ciphers. After the call
of the eSTREAM project in 2004, 34 stream ciphers with different design approaches were …