## High-Speed Algorithms & Architectures For Number-Theoretic Cryptosystems (1997)

Citations: | 3 - 0 self |

### BibTeX

@TECHREPORT{Koc97high-speedalgorithms,

author = {Cetin K. Koc and Tolga Acar},

title = {High-Speed Algorithms & Architectures For Number-Theoretic Cryptosystems},

institution = {},

year = {1997}

}

### OpenURL

### Abstract

Abstract approved:

### Citations

853 |
The MD5 Message-Digest Algorithm
- Rivest
(Show Context)
Citation Context ... Data Encryption Standard (DES) [70, 76, 71, 77] d) Secure Hash Algorithm (SHA-1) [78, 79] e) MD2, Message Digest Algorithm [80] f) MD4, Message Digest Algorithm [71] g) MD5, Message Digest Algorithm =-=[81]-=- h) Digital Signature Algorithm (DSA, DSS) [4] i) Password based encryption and decryption (PBE) [53] j) International Data Encryption Algorithm (IDEA) [71, 72] k) RC2, encryption [71] l) RC5, variabl... |

350 |
Di®erential Cryptanalysis of the Data Encryption Standard
- Biham, Shamir
- 1993
(Show Context)
Citation Context ... software routines, we experienced that the following algorithms are often practised: a) RSA encryption and decryption [53, 75] b) Di e-Hellman key exchange [53, 75] c) Data Encryption Standard (DES) =-=[70, 76, 71, 77]-=- d) Secure Hash Algorithm (SHA-1) [78, 79] e) MD2, Message Digest Algorithm [80] f) MD4, Message Digest Algorithm [71] g) MD5, Message Digest Algorithm [81] h) Digital Signature Algorithm (DSA, DSS) [... |

34 |
Public Key Cryptography
- Salomaa
- 1990
(Show Context)
Citation Context ...vailable, only a subset of them found applications in real life. In the developed software routines, we experienced that the following algorithms are often practised: a) RSA encryption and decryption =-=[53, 75]-=- b) Di e-Hellman key exchange [53, 75] c) Data Encryption Standard (DES) [70, 76, 71, 77] d) Secure Hash Algorithm (SHA-1) [78, 79] e) MD2, Message Digest Algorithm [80] f) MD4, Message Digest Algorit... |

33 |
Message authentication with MD5
- Kaliski, Robshaw
- 1995
(Show Context)
Citation Context ....3. RSA and MD5 Implementations on TMS320C16 A cryptographic library is developed for RSA Data Security. The library contains PKCS compliant 512-bit RSA crypto-system and MD5 message digest algorithm =-=[53, 81, 84]-=- for signature operations. Programs are written in TMS320C16 assembly language using a TMS320C16 add-on PC card and development package. The function calling sequences of signing and veri cation are d... |

8 |
On Modes of Operation
- Biham
- 1994
(Show Context)
Citation Context ... software routines, we experienced that the following algorithms are often practised: a) RSA encryption and decryption [53, 75] b) Di e-Hellman key exchange [53, 75] c) Data Encryption Standard (DES) =-=[70, 76, 71, 77]-=- d) Secure Hash Algorithm (SHA-1) [78, 79] e) MD2, Message Digest Algorithm [80] f) MD4, Message Digest Algorithm [71] g) MD5, Message Digest Algorithm [81] h) Digital Signature Algorithm (DSA, DSS) [... |

7 |
A layman’s guide to a subset of asn.1
- Burton, Jr
- 1993
(Show Context)
Citation Context ... gure, boxes represent function blocks. Function input and output arguments are BSafe compatible type, which enables the developed software package to interface with BSafe using ASN.1 data structures =-=[85, 86]-=-. This signal processor does not have an unsigned multiplication instruction. Thus, 16 by 16-bit unsigned multiplication is accomplished using 15-bit multiplication and corrective additions. If the pr... |

5 |
Suggestions for random number generation in software
- Matthews
- 1996
(Show Context)
Citation Context ...based encryption and decryption (PBE) [53] j) International Data Encryption Algorithm (IDEA) [71, 72] k) RC2, encryption [71] l) RC5, variable key-size encryption [69, 71] m) Random number generation =-=[82, 83]-=- We refrain from giving a complete list, because we believe that there is not an actual complete list of cryptographic algorithms. Some of the items on the presented list may be obsolete, and others m... |

5 |
Proper Initialization for the BSAFE Random Number Generator
- Baldwin
- 1996
(Show Context)
Citation Context ...based encryption and decryption (PBE) [53] j) International Data Encryption Algorithm (IDEA) [71, 72] k) RC2, encryption [71] l) RC5, variable key-size encryption [69, 71] m) Random number generation =-=[82, 83]-=- We refrain from giving a complete list, because we believe that there is not an actual complete list of cryptographic algorithms. Some of the items on the presented list may be obsolete, and others m... |

1 |
The MD2 Message-Digest Algorithm
- Jr
- 1992
(Show Context)
Citation Context ... encryption and decryption [53, 75] b) Di e-Hellman key exchange [53, 75] c) Data Encryption Standard (DES) [70, 76, 71, 77] d) Secure Hash Algorithm (SHA-1) [78, 79] e) MD2, Message Digest Algorithm =-=[80]-=- f) MD4, Message Digest Algorithm [71] g) MD5, Message Digest Algorithm [81] h) Digital Signature Algorithm (DSA, DSS) [4] i) Password based encryption and decryption (PBE) [53] j) International Data ... |

1 |
BSAFE: A Cryptographic Toolkit, Version 2.1
- Security, Inc, et al.
- 1994
(Show Context)
Citation Context ... gure, boxes represent function blocks. Function input and output arguments are BSafe compatible type, which enables the developed software package to interface with BSafe using ASN.1 data structures =-=[85, 86]-=-. This signal processor does not have an unsigned multiplication instruction. Thus, 16 by 16-bit unsigned multiplication is accomplished using 15-bit multiplication and corrective additions. If the pr... |