A block-cipher mode of operation for parallelizable message authentication

J Black, P Rogaway - International Conference on the Theory and …, 2002 - Springer
We define and analyze a simple and fully parallelizable block-cipher mode of operation for
message authentication. Parallelizability does not come at the expense of serial efficiency …

Cryptographic primitives for information authentication—State of the art

B Preneel - State of the Art in Applied Cryptography: Course on …, 1999 - Springer
This paper describes the state of the art for cryptographic primitives that are used for
protecting the authenticity of information: cryptographic hash functions and digital signature …

CBC MAC for real-time data sources

E Petrank, C Rackoff - Journal of Cryptology, 2000 - Springer
The Cipher Block Chaining (CBC) Message Authentication Code (MAC) is an authentication
method which is widely used in practice. It is well known that the use of the CBC MAC for …

The state of cryptographic hash functions

B Preneel - School organized by the European Educational Forum, 1998 - Springer
This paper describes the state of the art for cryptographic hash functions. Different definitions
are compared, and the few theoretical results on hash functions are discussed. A brief …

ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS

A Satoh, T Inoue - Integration, 2007 - Elsevier
The hash functions MD5, RIPEMD-160, and SHA-1/224/256/384/512 were implemented by
using a 0.13-μm CMOS standard cell library with two synthesis options, area and speed …

EETD: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip

M Hussain, A Malekpour, H Guo… - 2018 IEEE Computer …, 2018 - ieeexplore.ieee.org
Network-on-chip (NoC) is a communication intellectual property (IP) core, popularly used in
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …

Fast hashing on the Pentium

A Bosselaers, R Govaerts, J Vandewalle - Advances in Cryptology …, 1996 - Springer
With the advent of the Pentium processor parallelization finally became available to Intel
based computer systems. One of the design principles of the MD4-family of hash functions …

[图书][B] Security for a high performance commodity storage subsystem

HB Gobioff - 1999 - search.proquest.com
How do we incorporate security into a high performance commodity storage subsystem?
Technology trends and the increasing importance of I/O bound workloads are driving the …

On fair e-cash systems based on group signature schemes

S Canard, J Traoré - Information Security and Privacy: 8th Australasian …, 2003 - Springer
A fair electronic cash system is a system that allows customers to make payments
anonymously. Moreover, under certain circumstances, a trusted authority can revoke the …

SHA: a design for parallel architectures?

A Bosselaers, R Govaerts, J Vandewalle - Advances in Cryptology …, 1997 - Springer
To enhance system performance computer architectures tend to incorporate an increasing
number of parallel execution units. This paper shows that the new generation of MD4-based …