최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기International journal of maritime information and communication sciences, v.3 no.4, 2005년, pp.205 - 208
Youn Choong-Mo (School of Information Technology, Seoil College) , Lee Beom-Geun (Department of Electronic Engineering, Kyunghee University)
This paper is about the hardware implementation of the Hash algorithm, HAS-160, which is widely used for Internet security and authentication. VHDL modeling was used for its realization and the operation speed has been increased by the optimized scheduling of the operations required for step operati...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
TTAS.KO-12.0011/R1 (2000): Hash function Algorithm Standard (HAS-160)
Douglas R. Stinson, Cryptography Theory and Practice, CRC, 1995
J. Touch, 'Report on MD5 performance' RFC 1810, June 1995
Janaka Deepakumara, Howard M. Heys and R. Venkatesan, 'FPGA IMPLEMENTATION OF MD5 HASH ALGORITHM' Technical Paper, Engineering and Applied Science Memorial University of Newfoundland St. John Canada, 2001
Warwick Ford, Computer Communications Security, Prentice-Hall International Inc, 1994
Man Young Rhee, Cryptography and Secure Communications, McGraw-Hill, 1994
Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc. 1996
※ AI-Helper는 부적절한 답변을 할 수 있습니다.