共 50 条
- [32] An FPGA implementation of the SHA-3: The BLAKE Hash Function [J]. 2013 10TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2013,
- [33] Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 397 - 412
- [34] Design of FPGA Circuit for SHA-3 Encryption Algorithm [J]. ADVANCES IN NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, ICNC-FSKD 2022, 2023, 153 : 1471 - 1478
- [36] Performance Comparison of Keccak, Skein, Grostl, Blake and JH: SHA-3 Final Round Candidate Algorithms on ARM Cortex A8 Processor [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 367 - 384
- [37] High Throughput Pipelined Implementation of the SHA-3 Cryptoprocessor [J]. 2020 32ND INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2020, : 182 - 185
- [38] SHA-3 &Locking Protocol For Distributed Database Systems [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 293 - 297
- [39] SHA 3 and Keccak variants computation speeds on constrained devices [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 28 - 35
- [40] Developing a Hardware Evaluation Method for SHA-3 Candidates [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 248 - +