Results 91 to 100 of about 311,948 (105)

High-throughput implementation of the RIPEMD-160

open access: closedInternational Journal of Internet Technology and Secured Transactions, 2009
One-way hash functions are the main cryptographic primitives which are used in the network protocols for user authentication and message integration. In the literature, implementations have been proposed either in hardware or software. The rich number of implementations is expected considering the number of constraints of a target application. When the
Athanasios Kakarountas   +3 more
semanticscholar   +4 more sources

Application of novel technique in RIPEMD-160 aiming at high-throughput

open access: closed2008 IEEE International Symposium on Industrial Electronics, 2008
Hash functions, form a special family of cryptographic algorithms that satisfy current requirements for security, confidentiality and validity for several applications in technology. Many applications like PKI, IPSec, DSA, MACpsilas need the requirements mentioned before. All the previous applications incorporate hash functions and address, as the time
Harris E. Michail   +4 more
semanticscholar   +4 more sources

(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160

open access: closedInformation Security Conference, 2014
The hash function HAS-160 is standardized by the Korean government and widely used in Korea, and the hash function RIPEMD-160 is a worldwide ISO/IEC standard. In this paper, by careful analysis of the two hash functions, we propose a pseudo-preimage attack on 71-step HAS-160 (no padding) with complexity 2158.13 and a preimage attack on 34-step RIPEMD ...
Gaoli Wang, Yanzhao Shen
semanticscholar   +3 more sources

Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160

open access: closedIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
Chiaki Ohtahara   +2 more
semanticscholar   +3 more sources

ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS

open access: closedInternational Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, 2005
The hash functions MD5, RIPEMD-160, and SHA-1/224/256/384/512 were implemented by using a 0.13-µm CMOS standard cell library with two synthesis options, area and speed optimizations, and their performances were evaluated. The smallest circuit of 8.0 Kgates with a throughput of 934 Mbps, and the highest throughput of 2.9 Gbps with 27.3 Kgates were ...
Akashi Satoh, T. Inoue
openalex   +2 more sources

Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160

open access: closedDesigns, Codes and Cryptography, 2020
Gaoli Wang   +4 more
openalex   +2 more sources

ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS

open access: closedInternational Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, 2006
Akashi Satoh, Tadanobu Inoue
openalex   +2 more sources

Home - About - Disclaimer - Privacy