共 50 条
- [41] Developing a Hardware Evaluation Method for SHA-3 Candidates [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 248 - +
- [42] Machine-Checked Proofs for Cryptographic Standards Indifferentiability of SPONGE and Secure High-Assurance Implementations of SHA-3 [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1607 - 1622
- [43] Concurrent Error Detection for Reliable SHA-3 Design [J]. 2016 INTERNATIONAL GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI), 2016, : 39 - 44
- [44] The Intel AES Instructions Set and the SHA-3 Candidates [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 162 - +
- [46] On security arguments of the second round SHA-3 candidates [J]. International Journal of Information Security, 2012, 11 : 103 - 120
- [48] The State of Hash Functions and the NIST SHA-3 Competition [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 1 - 11
- [50] Security Reductions of the Second Round SHA-3 Candidates [J]. INFORMATION SECURITY, 2011, 6531 : 39 - +