Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Whirlpool (cryptography)

Known as: WHIRLPOOL, Whirlpool (disambiguation), Whirlpool (hash) 
In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The Substitution box (S-Box) forms the core building block of any hardware implementation of the Advanced Encryption Standard… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2010
2010
Cryptographic circuits are nowadays subject to attacks that no longer focus on the algorithm but rather on its physical… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2007
2007
This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This paper presents two low-area designs for the advanced encryption standard on field-programmable gate arrays (FPGAs). Both… Expand
  • figure 1
  • figure 2
  • table I
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In the hardware implementations of the Advanced Encryption Standard (AES) algorithm, employing composite field arithmetic not… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
Highly Cited
2005
Highly Cited
2005
So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks… Expand
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper presents novel high-speed architectures for the hardware implementation of the Advanced Encryption Standard (AES… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We present Whirlpool, a 512-bit hash function operating on messages less than 2 bits in length. The function structure is… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1995
Highly Cited
1995
This book considers critically the many issues that are raised by competency-based education and training, and provides practical… Expand
Is this relevant?