Recent developments in the design of conventional cryptographic algorithms

B Preneel, V Rijmen, A Bosselaers - State of the Art in Applied …, 1999 - Springer
This paper examines proposals for three cryptographic primitives: block ciphers, stream
ciphers, and hash functions. It provides an overview of the design principles of a large …

Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs

I Ahmad, AS Das - Computers & Electrical Engineering, 2005 - Elsevier
Hash functions are common and important cryptographic primitives, which are very critical
for data integrity assurance and data origin authentication security services. Field …

A 1 Gbit/s partially unrolled architecture of hash functions SHA-1 and SHA-512

R Lien, T Grembowski, K Gaj - Topics in Cryptology–CT-RSA 2004: The …, 2004 - Springer
Hash functions are among the most widespread cryptographic primitives, and are currently
used in multiple cryptographic schemes and security protocols, such as IPSec and SSL. In …

Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2

A Visconti, F Gorla - IEEE Transactions on Dependable and …, 2018 - ieeexplore.ieee.org
PBKDF2 [1] is a well-known password-based key derivation function. In order to slow
attackers down, PBKDF2 introduces CPU-intensive operations based on an iterated …

[PDF][PDF] The cryptographic hash function RIPEMD-160

B Preneel, A Bosselaers, H Dobbertin - 1997 - Citeseer
RIPEMD-160 is a fast cryptographic hash function that is tuned towards software
implementations on 32-bit architectures. It has evolved from the 256-bit extension of MD4 …

Performance analysis and parallel implementation of dedicated hash functions

J Nakajima, M Matsui - … 2002: International Conference on the Theory and …, 2002 - Springer
This paper shows an extensive software performance analysis of dedicated hash functions,
particularly concentrating on Pentium III, which is a current dominant processor. The …

[PDF][PDF] Peer-to-peer: Computaçao colaborativa na internet

J Rocha, M Domingues, A Callado, E Souto… - Minicursos do XXII …, 2004 - cin.ufpe.br
A computação peer-to-peer (P2P) tem promovido uma grande modificação nos padrões de
uso da Internet nos últimos anos. Sua grande vantagem, em relação à computação …

[PDF][PDF] Attacks on and advances in secure hash algorithms

N Kishore, B Kapoor - IAENG Int. J. Comput. Sci, 2016 - researchgate.net
In today's information-based society, encryption along with the techniques for authentication
and integrity are key to the security of information. Cryptographic hashing algorithms, such …

On software parallel implementation of cryptographic pairings

P Grabher, J Großschädl, D Page - International Workshop on Selected …, 2008 - Springer
A significant amount of research has focused on methods to improve the efficiency of
cryptographic pairings; in part this work is motivated by the wide range of applications for …

Parallel cryptographic hashing: Developments in the last 25 years

N Kishore, P Raina - Cryptologia, 2019 - Taylor & Francis
Parallel computing has led to fundamental changes in almost all research areas associated
with computer science; cryptography is no exception. Besides improved speed and resource …