Fast Hashing on the Pentium (1996)

by Antoon Bosselaers , René Govaerts , Joos Vandewalle , Joos V
Venue:Advances in Cryptology, Proceedings Crypto'96, LNCS 1109
Citations:37 - 4 self

Active Bibliography

12 SHA: A Design for Parallel Architectures? – Antoon Bosselaers, Rene Govaerts, Joos Vandewalle, Joos V - 1997
9 Hash Functions Based on Block Ciphers and Quaternary Codes – Lars Knudsen, Bart Preneel - 1996
5 On the Security of Dedicated Hash Functions – Bart Van Rompay, Bart Preneel, Joos Vandewalle - 1998
215 How to break MD5 and other hash functions – Xiaoyun Wang, Hongbo Yu - 2005
78 MDx-MAC and Building Fast MACs from Hash Functions – Bart Preneel, Paul C. Van Oorschot - 1995
10 Recent Developments in the Design of Conventional Cryptographic Algorithms – Bart Preneel, Vincent Rijmen, Antoon Bosselaers - 1998
Compare-by-Hash: A . . . – J. Black - 2006
11 On Recent Results for MD2, MD4 and MD5 – Matt Robshaw, M. J. B. Robshaw - 1996
54 Twofish: A 128-Bit Block Cipher – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson - 1998
A proposal of a criterion for collision resistance of hash functions – Dai Watanabe, Hirotaka Yoshida
CryptoBytes – The Technical Newsletter
70 Authenticated Multi-Party Key Agreement – Mike Just, Serge Vaudenay - 1996
On Securing Real-Time Speech Transmission over the Internet: An Experimental Study – Alessandro Aldini, Marco Roccetti, Roberto Gorrieri - 2003
EURASIP Journal on Applied Signal Processing 2003:10, 1027–1042 c ○ 2003 Hindawi Publishing Corporation On Securing Real-Time Speech Transmission over the Internet: An Experimental Study – Alessandro Aldini, Marco Roccetti, Roberto Gorrieri - 2003
31 Analyzing and Modeling Encryption Overhead For Sensor Network Nodes – Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander Dean, Frank Mueller, Mihail Sichitiu - 2003
RIPEMD-160: A Strengthened Version of RIPEMD – Hans Dobbertin Antoon, Hans Dobbertin, Antoon Bosselaers, Bart Preneel - 1996
3 Design principles for dedicated hash functions – Bart Preneel - 1994
Practical (Second) Preimage Attacks on TCS SHA-3 – Gautham Sekar, Soumyadeep Bhattacharya, Chennai India
unknown title – unknown authors - 2004