Parallel Implementation of LSH Using SSE and AVX |
Pack, Cheolhee
(Kongju National University)
Kim, Hyun-il (Kongju National University) Hong, Dowon (Kongju National University) Seo, Changho (Kongju National University) |
1 | X. Wang, A. C. Yao and F. Yao, "Cryptanalysis on SHA-1," CRYPTOGRAPHIC HASH WORKSHOP, October 2005. |
2 | X. Wang, Y. L. Yin and H. Yu, "Finding Collisions in the Full SHA-1," In Advances in Cryptology-CRYPTO 2005, pp. 17-36, August. 2005. |
3 | CRYPTOGRAPHIC HASH AND SHA-3 STANDARD DEVELOPMENT, http://csrc.nist.gov/groups/ST/hash/index.html |
4 | Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G, "Keccak sponge function family main document," Submission to NIST (Round 2), 3, 30. 2009. |
5 | SHA-3 STANDARDIZATION, http://csrc.nist.gov/groups/ST/hash/sha-3/sha-3_standardization.html |
6 | NIST, "DRAFT FIPS PUB 202," May 2014. |
7 | Kim, D. C., Hong, D., Lee, J. K., Kim, W. H., & Kwon, D, "Lsh: A new fast secure hash function family," In Information Security and Cryptology-ICISC 2014, Springer International Publishing, pp. 286-313, 2014. |
8 | Intel Intrinsics Guide, http://software.intel.com/sites/landingpage/IntrinsicsGuide/ |
9 | Korea cryptographic forum. http://kcryptof orum.or.kr/ |
10 | eBASH, http://bench.cr.yp.to/ebash.html |