Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Simultaneous Hashing of Multiple Messages"
written by Shay Gueron, Vlad Krasnov,
published by Journal of Information Security, Vol.3 No.4, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages
The Journal of Supercomputing, 2022
[2] Construction d'une bibliothèque cryptographique multi-plateformes formellement vérifiée à haute performance en F
2022
[3] HACL× N: Verified Generic SIMD Crypto
2020
[4] HACLxN: Verified Generic SIMD Crypto (for all your favourite platforms)
2020
[5] Round 2 Submission
2019
[6] Parallel cryptographic hashing: Developments in the last 25 years
2019
[7] Two Are Better than One: Software Optimizations for AES-GCM over Short Messages
Information Technology - New Generations, 2018
[8] SoK: A Performance Evaluation of Cryptographic Instruction Sets on Modern Architectures
2018
[9] Software Optimizations for DES
Information Technology - New Generations, 2018
[10] Solução mobile-banking, transações
2018
[11] Parallelizable Message Preprocessing for Merkle-Damgård Hash Functions
2018
[12] A toolbox for software optimization of QC-MDPC code-based cryptosystems
2017
[13] On plausible tree hash modes for SHA-3
IACR Cryptology ePrint Archive, 2016
[14] Parallelizable Message Preprocessing for Merkle-Damgard Hash Functions
2016
[15] Parallel SHA-256 in NEON for use in hash-based signatures
2016
[16] Speeding up R-LWE post-quantum key exchange
2016
[17] Software Optimizations of NTRUEncrypt for Modern Processor Architectures
Information Technology: New Generations, 2016
[18] Asymptotic analysis of plausible tree hash modes for SHA-3
2016
[19] Fast software implementation of SM3 Hash algorithm
《智能系统学报》, 2015
[20] Optimization of Tree Modes for Parallel Hash Functions
arXiv preprint arXiv:1512.05864, 2015
[21] SM3 杂凑算法的软件快速实现研究
智能系统学报, 2015
[22] Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256.
IACR Cryptology ePrint Archive, 2014
[23] New Trends in Cryptographic Algorithm Suites Used for Transport Layer Security Communications
S Gueron - intel.activeevents.com, 2014
[24] Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
2014
[25] A j-lanes tree hashing mode and j-lanes SHA-256
Journal of Information Security, 2013
[26] Efficient vector implementations of AES-Based designs: a case study and new implemenations for gr?stl
Topics in Cryptology–CT-RSA 2013. Springer Berlin Heidelberg, 2013
[27] Efficient vector implementations of AES-based designs: a case study and new implemenations for Grøstl
Topics in Cryptology – CT-RSA 2013, 2013
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top