|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 34 occurrences of 31 keywords
|
|
|
Results
Found 23 publication records. Showing 23 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
117 | Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede |
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Signal Process. Syst. ![In: J. Signal Process. Syst. 53(1-2), pp. 89-102, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Architecture design methodology, MD4-based hash algorithm, SHA1, RIPEMD-160, Iteration bound analysis, DFG (Data Flow Graph) transformation, Throughput optimization, MD5 |
76 | Feng Ge, Pranjal Jain, Ken Choi |
Ultra-low power and high speed design and implementation of AES and SHA1 hardware cores in 65 nanometer CMOS technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, Windsor, Ontario, Canada, June 7-9, 2009, pp. 405-410, 2009, IEEE, 978-1-4244-3355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo |
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 1-20, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery |
54 | Chen-Hsing Wang, Chih-Yen Lo, Min-Sheng Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, Shi-Yu Huang |
A network security processor design based on an integrated SOC design and test platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 43rd Design Automation Conference, DAC 2006, San Francisco, CA, USA, July 24-28, 2006, pp. 490-495, 2006, ACM, 1-59593-381-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
HMAC-MD5, HMAC-SHA1, AES, RSA, AMBA, RNG |
34 | Neha Kashyap, Sapna Sinha, Vineet Kansal |
A Hybrid Lightweight Method of ABE with SHA1 Algorithm for Securing the IoT Data on Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Perform. Eng. ![In: Int. J. Perform. Eng. 20(3), pp. 131-138, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
34 | Frank Schuhmacher |
Canonical DPA Attack on HMAC-SHA1/SHA2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings, pp. 193-211, 2022, Springer, 978-3-030-99765-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Seongho Cho, Daejin Park |
Robust Intra-Body Communication Using SHA1-CRC Inversion-Based Protection and Error Correction for Securing Electronic Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 20(21), pp. 6056, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
34 | Esmael Verano Maliberan |
Modified SHA1: A Hashing Solution to Secure Web Applications through Login Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 11(1), 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
34 | Nick Merrill |
Better Not to Know?: The SHA1 Collision & the Limits of Polemic Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LIMITS ![In: Proceedings of the 2017 Workshop on Computing Within Limits, LIMITS 2017, Santa Barbara, California, USA, June 22-24, 2017, pp. 37-42, 2017, ACM, 978-1-4503-4950-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Ludger Hemme, Lars Hoffmann |
Differential Fault Analysis on the SHA1 Compression Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2011, Tokyo, Japan, September 29, 2011, pp. 54-62, 2011, IEEE Computer Society, 978-1-4577-1463-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Christina Lindenberg, Kai Wirt |
SHA1, RSA, PSS and more. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Arch. Formal Proofs ![In: Arch. Formal Proofs 2005, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
34 | Donald E. Eastlake III, Paul E. Jones |
US Secure Hash Algorithm 1 (SHA1). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 3174, pp. 1-22, September 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Perry Metzger, William Allen Simpson |
IP Authentication using Keyed SHA1 with Interleaved Padding (IP-MAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2841, pp. 1-9, November 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park |
Accelerating SSL with GPUs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 437-438, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
GPU, CUDA, SSL |
21 | Firdous Kausar, Sajid Hussain, Laurence Tianruo Yang, Ashraf Masood |
Scalable and efficient key management for heterogeneous sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 45(1), pp. 44-65, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Random key predistribution, Security, Authentication, Key management, Heterogeneous sensor networks |
21 | Gaëtan Leurent |
MD4 is Not One-Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 412-428, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, preimage, MD4, one-way |
21 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 173-186, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
21 | Ryo Nojima, Kazukuni Kobara, Hideki Imai |
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 303-316, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Arjen K. Lenstra, Dan Page, Martijn Stam |
Discrete Logarithm Variants of VSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 229-242, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cyclotomic Subgroup, Hash Functions, Collision Resistance |
21 | T. S. Ganesh, T. S. B. Sudarshan |
ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 580-585, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Tadayoshi Kohno |
Attacking and repairing the winZip encryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 72-81, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
WinZip, Zip, security fixes, compression, encryption, attacks, applied cryptography |
21 | Monalisa Mukherjee, Niloy Ganguly, Parimal Pal Chaudhuri |
Cellular Automata Based Authentication (CAA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACRI ![In: Cellular Automata, 5th International Conference on Cellular Automata for Research and Industry, ACRI 2002, Geneva, Switzerland, October 9-11, 2002, Proceedings, pp. 259-269, 2002, Springer, 3-540-44304-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway |
UMAC: Fast and Secure Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 216-233, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #23 of 23 (100 per page; Change: )
|
|