Results 91 to 100 of about 311,948 (105)
High-throughput implementation of the RIPEMD-160
One-way hash functions are the main cryptographic primitives which are used in the network protocols for user authentication and message integration. In the literature, implementations have been proposed either in hardware or software. The rich number of implementations is expected considering the number of constraints of a target application. When the
Athanasios Kakarountas +3 more
semanticscholar +4 more sources
Application of novel technique in RIPEMD-160 aiming at high-throughput
Hash functions, form a special family of cryptographic algorithms that satisfy current requirements for security, confidentiality and validity for several applications in technology. Many applications like PKI, IPSec, DSA, MACpsilas need the requirements mentioned before. All the previous applications incorporate hash functions and address, as the time
Harris E. Michail +4 more
semanticscholar +4 more sources
(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160
The hash function HAS-160 is standardized by the Korean government and widely used in Korea, and the hash function RIPEMD-160 is a worldwide ISO/IEC standard. In this paper, by careful analysis of the two hash functions, we propose a pseudo-preimage attack on 71-step HAS-160 (no padding) with complexity 2158.13 and a preimage attack on 34-step RIPEMD ...
Gaoli Wang, Yanzhao Shen
semanticscholar +3 more sources
Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160
Chiaki Ohtahara +2 more
semanticscholar +3 more sources
ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS
The hash functions MD5, RIPEMD-160, and SHA-1/224/256/384/512 were implemented by using a 0.13-µm CMOS standard cell library with two synthesis options, area and speed optimizations, and their performances were evaluated. The smallest circuit of 8.0 Kgates with a throughput of 934 Mbps, and the highest throughput of 2.9 Gbps with 27.3 Kgates were ...
Akashi Satoh, T. Inoue
openalex +2 more sources
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
Gaoli Wang +4 more
openalex +2 more sources
ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS
Akashi Satoh, Tadanobu Inoue
openalex +2 more sources
Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
Chiaki Ohtahara +2 more
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Unified Architecture of MD5 and PIPEMD 160 Hash Algorithms
2007published_or_final_version
Ng, TS, Ng, CW, Yip, KW
openaire +2 more sources

