|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 34 occurrences of 31 keywords
|
|
|
Results
Found 23 publication records. Showing 23 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
117 | Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede |
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class. |
J. Signal Process. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Architecture design methodology, MD4-based hash algorithm, SHA1, RIPEMD-160, Iteration bound analysis, DFG (Data Flow Graph) transformation, Throughput optimization, MD5 |
76 | Feng Ge, Pranjal Jain, Ken Choi |
Ultra-low power and high speed design and implementation of AES and SHA1 hardware cores in 65 nanometer CMOS technology. |
EIT |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo |
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery |
54 | Chen-Hsing Wang, Chih-Yen Lo, Min-Sheng Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, Shi-Yu Huang |
A network security processor design based on an integrated SOC design and test platform. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
HMAC-MD5, HMAC-SHA1, AES, RSA, AMBA, RNG |
34 | Neha Kashyap, Sapna Sinha, Vineet Kansal |
A Hybrid Lightweight Method of ABE with SHA1 Algorithm for Securing the IoT Data on Cloud. |
Int. J. Perform. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
34 | Frank Schuhmacher |
Canonical DPA Attack on HMAC-SHA1/SHA2. |
COSADE |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Seongho Cho, Daejin Park |
Robust Intra-Body Communication Using SHA1-CRC Inversion-Based Protection and Error Correction for Securing Electronic Authentication. |
Sensors |
2020 |
DBLP DOI BibTeX RDF |
|
34 | Esmael Verano Maliberan |
Modified SHA1: A Hashing Solution to Secure Web Applications through Login Authentication. |
Int. J. Commun. Networks Inf. Secur. |
2019 |
DBLP BibTeX RDF |
|
34 | Nick Merrill |
Better Not to Know?: The SHA1 Collision & the Limits of Polemic Computation. |
LIMITS |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Ludger Hemme, Lars Hoffmann |
Differential Fault Analysis on the SHA1 Compression Function. |
FDTC |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Christina Lindenberg, Kai Wirt |
SHA1, RSA, PSS and more. |
Arch. Formal Proofs |
2005 |
DBLP BibTeX RDF |
|
34 | Donald E. Eastlake III, Paul E. Jones |
US Secure Hash Algorithm 1 (SHA1). |
RFC |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Perry Metzger, William Allen Simpson |
IP Authentication using Keyed SHA1 with Interleaved Padding (IP-MAC). |
RFC |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park |
Accelerating SSL with GPUs. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
GPU, CUDA, SSL |
21 | Firdous Kausar, Sajid Hussain, Laurence Tianruo Yang, Ashraf Masood |
Scalable and efficient key management for heterogeneous sensor networks. |
J. Supercomput. |
2008 |
DBLP DOI BibTeX RDF |
Random key predistribution, Security, Authentication, Key management, Heterogeneous sensor networks |
21 | Gaëtan Leurent |
MD4 is Not One-Way. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, preimage, MD4, one-way |
21 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
21 | Ryo Nojima, Kazukuni Kobara, Hideki Imai |
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Arjen K. Lenstra, Dan Page, Martijn Stam |
Discrete Logarithm Variants of VSH. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Cyclotomic Subgroup, Hash Functions, Collision Resistance |
21 | T. S. Ganesh, T. S. B. Sudarshan |
ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Tadayoshi Kohno |
Attacking and repairing the winZip encryption scheme. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
WinZip, Zip, security fixes, compression, encryption, attacks, applied cryptography |
21 | Monalisa Mukherjee, Niloy Ganguly, Parimal Pal Chaudhuri |
Cellular Automata Based Authentication (CAA). |
ACRI |
2002 |
DBLP DOI BibTeX RDF |
|
21 | John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway |
UMAC: Fast and Secure Message Authentication. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #23 of 23 (100 per page; Change: )
|
|