共 50 条
- [41] The State of Hash Functions and the NIST SHA-3 Competition [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 1 - 11
- [44] Security Reductions of the Second Round SHA-3 Candidates [J]. INFORMATION SECURITY, 2011, 6531 : 39 - +
- [45] A New High Throughput and Area Efficient SHA-3 Implementation [J]. 2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
- [46] Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 126 - 141
- [47] High-performance implementation of an HMAC processor based on SHA-3 Hash function [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRON DEVICES AND SOLID-STATE CIRCUITS (EDSSC), 2017,
- [50] Beyond the Limits: SHA-3 in just 49 Slices [J]. 2019 29TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2019, : 239 - 245