共 50 条
- [21] Performance Analysis of Modified SHA-3 [J]. INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 904 - 910
- [22] Algebraic Fault Analysis of SHA-3 [J]. PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 151 - 156
- [24] Parallel Implementations of SHA-3 on a 24-core Processor with Software and Hardware Co-Design [J]. 2017 IEEE 12TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2017, : 953 - 956
- [25] SHA-2 and SHA-3 Based Sequence Randomization Algorithm [J]. 2016 2ND INTERNATIONAL CONFERENCE ON SCIENCE AND TECHNOLOGY-COMPUTER (ICST), 2016,
- [26] Improving FPGA based SHA-3 structures [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 159 - 159
- [27] Side Channel Analysis of the SHA-3 Finalists [J]. DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 1012 - 1017
- [28] Integral Distinguishers of Some SHA-3 Candidates [J]. CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 106 - +
- [29] Relaxed Differential Fault Analysis of SHA-3 [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 11 (02): : 129 - 143
- [30] The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3 [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 402 - 431