2009
DOI: 10.1007/978-0-387-71829-3_5
|View full text |Cite
|
Sign up to set email alerts
|

Hardware design for Hash functions

Abstract: The design philosophy of the most commonly used hash algorithms such as MD5, SHA family and RIPEMD is based on design principles of the MD4 family. In this section we will give a short overview and provide historical facts about existing attacks on these algorithms.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 34 publications
(50 reference statements)
0
1
0
Order By: Relevance
“…It shows that techniques which were originally developed for improving the throughput of digital filters with feedback can be also applied to hash function implementations. For more information about hardware design for cryptographic hash function we refer the reader to [43].…”
Section: Fig 1 Md6 Dfg -Critical Pathmentioning
confidence: 99%
“…It shows that techniques which were originally developed for improving the throughput of digital filters with feedback can be also applied to hash function implementations. For more information about hardware design for cryptographic hash function we refer the reader to [43].…”
Section: Fig 1 Md6 Dfg -Critical Pathmentioning
confidence: 99%