共 50 条
- [1] Second Preimage Attack on SHAMATA-512 PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 169 - 181
- [8] GENERATION OF GENERAL SYSTEM PARAMETERS FOR FALCON CRYPTOSYSTEM FOR 256, 384, AND 512 SECURITY BITS Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2022, 81 (02): : 49 - 59
- [9] Efficient single-chip implementation of SHA-384 & SHA-512 2002 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2002, : 311 - 314
- [10] The hardware implementations of the SHA-2 (256,384,512) hash functions PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL V: BIO-MEDICAL CIRCUITS & SYSTEMS, VLSI SYSTEMS & APPLICATIONS, NEURAL NETWORKS & SYSTEMS, 2003, : 153 - 156