共 15 条
[1]
[Anonymous], 2010, CMOS VLSI Design: A Circuits and Systems Perspective
[2]
[Anonymous], SPONG FUNCT
[3]
[Anonymous], CRYPT HASH ALG COMP
[4]
Aoki K., 2000, SPECIFICATION CAMELL
[5]
Badel S, 2010, LECT NOTES COMPUT SC, V6225, P398, DOI 10.1007/978-3-642-15031-9_27
[6]
Bertoni Guido., CRYPTOGRAPHIC SPONGE
[7]
Throughput optimized SHA-1 architecture using unfolding transformation
[J].
IEEE 17TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, PROCEEDINGS,
2006,
:354-+
[8]
Li L., 2012, THESIS ILLINOIS I TE
[9]
Lin K., 2013, P FTRA INT C ADV IT
[10]
A low-power and high-throughput implementation of the SHA-1 hash function
[J].
2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS,
2005,
:4086-4089