Sciweavers

277 search results - page 15 / 56
» The Whirlpool Secure Hash Function
Sort
View
FSE
2010
Springer
147views Cryptology» more  FSE 2010»
14 years 1 months ago
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nan...
FSE
2010
Springer
124views Cryptology» more  FSE 2010»
14 years 1 months ago
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
ISCAS
2003
IEEE
114views Hardware» more  ISCAS 2003»
14 years 1 months ago
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new en...
Nicolas Sklavos, Odysseas G. Koufopavlou