Parallelizing message schedules to accelerate the computations of hash functions, Journal of Cryptographic Engineering, vol.2, issue.4, pp.241-253, 2012. ,
DOI : 10.1007/s13389-012-0037-z
Simultaneous Hashing of Multiple Messages, Journal of Information Security, vol.03, issue.04, pp.319-325, 2012. ,
DOI : 10.4236/jis.2012.34039
A Design Principle for Hash Functions, CRYPTO '89: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, pp.416-427, 1990. ,
DOI : 10.1007/0-387-34805-0_39
Secrecy, authentication, and public key systems, 1979. ,
Protocols for Public Key Cryptosystems, 1980 IEEE Symposium on Security and Privacy, pp.122-134, 1980. ,
DOI : 10.1109/SP.1980.10006
The skein hash function family (version 1, 2009. ,
BLAKE2: Simpler, Smaller, Fast as MD5, Proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS'13, pp.119-135, 2013. ,
DOI : 10.1007/978-3-642-38980-1_8
The md6 hash function: A proposal to nist for, p.3, 2008. ,
A Parallel Algorithm for Extending Cryptographic Hash Functions, Progress in Cryptology -INDOCRYPT 2001, Second International Conference on Cryptology in India, pp.40-49, 2001. ,
DOI : 10.1007/3-540-45311-3_4
A parallelizable design principle for cryptographic hash functions, IACR Cryptology ePrint Archive, p.31, 2002. ,
PARSHA-256 ??? A New Parallelizable Hash Function and a Multithreaded Implementation, Fast Software Encryption, 10th International Workshop, FSE 2003, pp.347-361, 2003. ,
DOI : 10.1007/978-3-540-39887-5_25
Sufficient conditions for sound tree and sequential hashing modes, Cryptology ePrint Archive, Report, p.210, 2009. ,
Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA- 256, IACR Cryptology ePrint Archive, vol.170, p.2014, 2014. ,