共 50 条
- [2] Secure Hash Algorithm SHA-3 [J]. Datenschutz und Datensicherheit - DuD, 2013, 37 (2) : 104 - 104
- [3] A Secure Hash Algorithm with only 8 Folded SHA-1 Steps [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 194 - 205
- [4] VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 105 - 113
- [5] AN EFFICIENT FAULT DETECTION SCHEME FOR THE SECURE HASH ALGORITHM SHA-512 [J]. 2017 INTERNATIONAL CONFERENCE ON GREEN ENERGY & CONVERSION SYSTEMS (GECS), 2017,
- [7] Efficient Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist - Skein [J]. FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 933 - 940
- [9] Efficient FPGA Implementation of Secure Hash Algorithm Grostl - SHA-3 Finalist [J]. EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 361 - +