High-Speed Algorithms & Architectures For Number-Theoretic Cryptosystems (1997)

by Cetin K. Koc , Tolga Acar
Citations:3 - 0 self

Active Bibliography

3 On the Security of Double and 2-Key Triple Modes of Operation – Helena Handschuh, Bart Preneel
1 A Universal Encryption Standard – Helena Handschuh, Serge Vaudenay - 2000
unknown title – Foreword Whitfield Diffie
102 Tweakable block ciphers – Moses Liskov, Ronald L. Rivest, David Wagner - 2002
Cryptographic Primitives – Paul Garrett - 2007
28 On the security of two MAC algorithms – Bart Preneel, Paul C. Van Oorschot Y - 1996
Table of Contents – Status Of This
Digest Access Authentication – J. Franks, Verisign Inc, J. L. Hostetler, Abisource Inc, P. J. Leach, A. Luotonen, L. Stewart - 1999
Obsoletes: 1852 – P. Metzger, W. Simpson - 2000
46 Message Authentication using Hash Functions- The HMAC Construction – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
Network Working Group P. Karn Request for Comments: 1851 Qualcomm Category: Experimental P. Metzger Piermont W. Simpson Daydreamer September 1995 The ESP Triple DES Transform – Status Of This, W. Simpson
A proposal of a criterion for collision resistance of hash functions – Dai Watanabe, Hirotaka Yoshida
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
3 Cryptanalysis of 3-pass HAVAL – Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos V - 2003
29 Tiger: A Fast New Hash Function – Ross Anderson, Eli Biham - 1996
16 Informatica Economic─â vol. 13, no. 1/2009 Security Issues of the Digital Certificates within Public Key Infrastructures – Cristian Toma
Data-Oriented Architecture: A Loosely-Coupled Real-Time SOA – Rajive Joshi Ph. D - 2007
2 Location-aware Access Control for Pervasive Computing Environments – Stephen Garland, Nikolaos Michalakis, Nikolaos Michalakis - 2003