Journal of Engineering and Applied Sciences

Year: 2016
Volume: 11
Issue: 1
Page No. 162 - 166

Design and Implementation of the Lighter Version of Skein Cryptographic Hash Function Using Verilog HDL

Authors : Aparna Lakshmi Mooragondi, Sushrut Prabhakar, Avinash Yadlapati and Ranjan K. Senapati

References

Aumasson, J.P., C. Calik, W. Meier, O. Ozen, R.C.W. Phan and K. Varici, 2009. Improved cryptanalysis of skein. Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, December 6-10, 2009, Tokyo, Japan, pp: 542-559.

Bellare, M., K. Joe and R. Phillip, 1990. The Security of Cipher Block Chaining. In: Advances in Cryptology-Crypto 94, Desmedt, Y.G. (Eds.). Springer-Verlag, New York, pp: 341-358.

Burr, W.E., 2006. Cryptographic hash standards: Where do we go from here?. IEEE Secur. Privacy, 2: 88-91.
Direct Link  |  

Ferguson, N., S. Lucks, B. Schneier, D. Whiting and M. Bellare et al., 2010. The Skein hash function family. Submission NIST., 7: 1-86.
Direct Link  |  

Kamal, A.H.M. and G. Hossain, 2004. A new approach of image encryption a part of cryptography. Asia J. Inform. Technol., 3: 607-610.
Direct Link  |  

Tilich, S., 2009. Hardware implementation of the SHA-3 candidate Skein. Institute for Applied Information Processing and Communication, Graz University of Technology, Austria.

Wakerly, J.F., 2006. Digital Design Principles and Practices. Pearson Education, New Jersey, United States, Pages: 261.

Webster, D.M. and M. Lukowiak, 2011. Versatile FPGA architecture for skein hashing algorithm. Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig), November 30-December 2, 2011, IEEE, Cancun, Mexico, ISBN: 978-1-4577-1734-5, pp: 268-273.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved