共 50 条
- [44] Comparative Analysis of high speed and low area architectures of Blake SHA-3 candidate on FPGA 10TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2012), 2012, : 248 - 253
- [46] Software Implementation of Standard Hash Algorithm (SHA-3) Keccak on Intel Core-i5 and Cavium Networks Octeon Plus embedded platform 2013 2ND MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2013,
- [47] SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems 2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 393 - 398
- [48] Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 111 - +
- [49] Secure Neural Circuits to Mitigate Correlation Power Analysis on SHA-3 Hash Function 2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 161 - 166
- [50] On the Implementation of McEliece with CCA2 Indeterminacy by SHA-3 2014 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2014, : 2804 - 2807