共 50 条
- [1] High Throughput Design and Implementation of SHA-3 Hash Algorithm [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRON DEVICES AND SOLID-STATE CIRCUITS (EDSSC), 2017,
- [2] Secure Hash Algorithm SHA-3 [J]. Datenschutz und Datensicherheit - DuD, 2013, 37 (2) : 104 - 104
- [3] High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm [J]. 2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 68 - 71
- [4] An FPGA implementation of the SHA-3: The BLAKE Hash Function [J]. 2013 10TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2013,
- [5] Efficient Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist - Skein [J]. FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 933 - 940
- [6] Efficient FPGA Implementation of Secure Hash Algorithm Grostl - SHA-3 Finalist [J]. EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 361 - +
- [7] HIGH THROUGHPUT PIPELINED FPGA IMPLEMENTATION OF THE NEW SHA-3 CRYPTOGRAPHIC HASH ALGORITHM [J]. 2014 6TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING (ISCCSP), 2014, : 538 - 541
- [8] Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2014, 7 (05): : 1 - 6
- [9] Efficient Implementation of KECCAK (SHA-3) Algorithm on FPGA [J]. WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1238 - 1241
- [10] Design and Implementation of a SHA-3 Candidate Skein-512 Hash/MAC Hardware Architecture [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2012, : 561 - 566