共 44 条
[2]
[Anonymous], 2015, SHA-3 standard: Permutation-based hash and extendable-output functions, DOI DOI 10.6028/NIST.FIPS.202
[3]
Arshad A, 2014, 2014 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), P29, DOI 10.1109/CIACS.2014.6861327
[4]
Assad F., 2022, INT J HIGH PERFORM C, V12, P1324, DOI DOI 10.11591/IJECE.V12I2.PP1324-1333
[5]
Aziz A., 2016, Cankaya Univ. Sci. J. Eng, V13, P40
[6]
Baldwin B., 2010, Proceedings 2010 International Conference on Field Programmable Logic and Applications (FPL 2010), P400, DOI 10.1109/FPL.2010.84
[7]
Bertoni G., 2011, KECCAK REFERENCE SUB, V13, P14
[8]
Bertoni G, 2013, LECT NOTES COMPUT SC, V7881, P313, DOI 10.1007/978-3-642-38348-9_19
[10]
Computer SecurityDivision I.T.L., 2016, EX VAL CRYPT STAND G