Journal of Engineering and Applied Sciences
Year:
2016
Volume:
11
Issue:
1
Page No.
162 - 166
References
Aumasson, J.P., C. Calik, W. Meier, O. Ozen, R.C.W. Phan and K. Varici, 2009. Improved cryptanalysis of skein. Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, December 6-10, 2009, Tokyo, Japan, pp: 542-559.
Bellare, M., K. Joe and R. Phillip, 1990. The Security of Cipher Block Chaining. In: Advances in Cryptology-Crypto 94, Desmedt, Y.G. (Eds.). Springer-Verlag, New York, pp: 341-358.
Burr, W.E., 2006. Cryptographic hash standards: Where do we go from here?. IEEE Secur. Privacy, 2: 88-91.
Direct Link | Ferguson, N., S. Lucks, B. Schneier, D. Whiting and M. Bellare
et al., 2010. The Skein hash function family. Submission NIST., 7: 1-86.
Direct Link | Kamal, A.H.M. and G. Hossain, 2004. A new approach of image encryption a part of cryptography. Asia J. Inform. Technol., 3: 607-610.
Direct Link | Tilich, S., 2009. Hardware implementation of the SHA-3 candidate Skein. Institute for Applied Information Processing and Communication, Graz University of Technology, Austria.
Wakerly, J.F., 2006. Digital Design Principles and Practices. Pearson Education, New Jersey, United States, Pages: 261.
Webster, D.M. and M. Lukowiak, 2011. Versatile FPGA architecture for skein hashing algorithm. Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig), November 30-December 2, 2011, IEEE, Cancun, Mexico, ISBN: 978-1-4577-1734-5, pp: 268-273.