"Simultaneous Hashing of Multiple Messages"
written by Shay Gueron, Vlad Krasnov,
published by Journal of Information Security, Vol.3 No.4, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Round 2 Submission
2019
[2] Parallel cryptographic hashing: Developments in the last 25 years
2019
[3] Two Are Better than One: Software Optimizations for AES-GCM over Short Messages
Information Technology - New Generations, 2018
[4] SoK: A Performance Evaluation of Cryptographic Instruction Sets on Modern Architectures
2018
[5] Software Optimizations for DES
Information Technology - New Generations, 2018
[6] Solução mobile-banking, transações
2018
[7] Parallelizable Message Preprocessing for Merkle-Damgård Hash Functions
2018
[8] A toolbox for software optimization of QC-MDPC code-based cryptosystems
2017
[9] On plausible tree hash modes for SHA-3
IACR Cryptology ePrint Archive, 2016
[10] Parallelizable Message Preprocessing for Merkle-Damgard Hash Functions
2016
[11] Parallel SHA-256 in NEON for use in hash-based signatures
2016
[12] Speeding up R-LWE post-quantum key exchange
2016
[13] Software Optimizations of NTRUEncrypt for Modern Processor Architectures
Information Technology: New Generations, 2016
[14] Asymptotic analysis of plausible tree hash modes for SHA-3
2016
[15] Fast software implementation of SM3 Hash algorithm
《智能系统学报》, 2015
[16] Optimization of Tree Modes for Parallel Hash Functions
arXiv preprint arXiv:1512.05864, 2015
[17] SM3 杂凑算法的软件快速实现研究
智能系统学报, 2015
[18] Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256.
IACR Cryptology ePrint Archive, 2014
[19] New Trends in Cryptographic Algorithm Suites Used for Transport Layer Security Communications
S Gueron - intel.activeevents.com, 2014
[20] Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
2014
[21] A j-lanes tree hashing mode and j-lanes SHA-256
Journal of Information Security, 2013
[22] Efficient vector implementations of AES-Based designs: a case study and new implemenations for gr?stl
Topics in Cryptology–CT-RSA 2013. Springer Berlin Heidelberg, 2013
[23] Efficient vector implementations of AES-based designs: a case study and new implemenations for Grøstl
Topics in Cryptology – CT-RSA 2013, 2013