CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
A Software-Optimised Encryption Algorithm
Fast Software Encryption, Cambridge Security Workshop
RIPEMD-160: A Strengthened Version of RIPEMD
Proceedings of the Third International Workshop on Fast Software Encryption
Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
On the security of two MAC algorithms
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Mercy: A Fast Large Block Cipher for Disk Sector Encryption
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Producing Collisions for PANAMA
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
A New Keystream Generator MUGI
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Cryptanalysis of Stream Ciphers with Linear Masking
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
New Stream Cipher Designs
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Fault analysis on stream cipher MUGI
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Trivium: a stream cipher construction inspired by block cipher design principles
ISC'06 Proceedings of the 9th international conference on Information Security
Analysis of the non-linear part of mugi
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Proof of a conjecture on the joint linear complexity profile of multisequences
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
The probabilistic theory of the joint linear complexity of multisequences
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Rekeying issues in the MUGI stream cipher
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Lattice basis reduction algorithms and multi-dimensional continued fractions
Finite Fields and Their Applications
Producing collisions for PANAMA, instantaneously
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Differential and linear cryptanalysis using mixed-integer linear programming
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.00 |
We present a cryptographic module that can be used both as a cryptographic hash function and as a stream cipher. High performance is achieved through a combination of low work-factor and a high degree of parallelism. Throughputs of 5.1 bits/cycle for the hashing mode and 4.7 bits/cycle for the stream cipher mode are demonstrated on a commercially available VLIW micro-processor.