Claim Your Author Page
Ensure your research is discoverable on Semantic Scholar. Claiming your author page allows you to personalize the information displayed and manage your publications. Semantic Scholar automatically creates author pages based on data aggregated from public sources and our publisher partners.
Cryptographic hash functions are an important tool in cryptography for applications such as digital fingerprinting of messages, message authentication, and key derivation. During the last five years,… Expand
At Crypto '91 Ronald L. Rivest introduced the MD5 Message Digest Algorithm as a strengthened version of MD4, di ering from it on six points. Four changes are due to the two existing attacks on the… Expand
We present the new block cipher SHARK. This cipher combines highly non-linear substitution boxes and maximum distance separable error correcting codes (MDS-codes) to guarantee a good diffusion. The… Expand
We present a software implementation of arithmetic operations in a finite field GF(2n), based on an alternative representation of the field elements. An important application is in elliptic curve… Expand
In [Rive90] the MD4 message digest algorithm was introduced taking an input message of arbitrary length and producing an output 128-bit message digest. It is conjectured that it is computationally… Expand
This is a manual intended for those seeking to secure information systems by applying modern cryptography. It represents the successful at tainment of goals by RIPE (RACE Integrity Primitives… Expand
Three modular reduction algorithms for large integers are compared with respect to their performance in portable software: the classical algorithm, Barrett's algorithm and Montgomery's algorithm.… Expand
With the advent of the Pentium processor parallelization finally bccarne available to Intel based computer systems. One of the design principles of the MD4-family of hash functions (MD4, MD5, SHA-1,… Expand
At Crypto '91 Ronald L. Rivest introduced the MD5 Message Digest Algorithm as a strengthened version of MD4, differing from it on six points. Four changes are due to the two existing attacks on the… Expand
and background.- Integrity concepts.- to part III.- MDC-4.- RIPEMD.- RIPE-MAC.- IBC-hash.- SKID.- RSA.- COMSET.- RSA key generation.- Implementation guidelines for arithmetic computation.