共 50 条
- [31] COMPARISON AND ANALYSIS STUDY OF SHA-3 FINALISTS 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 366 - 371
- [32] Comparative Analysis of high speed and low area architectures of Blake SHA-3 candidate on FPGA 10TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2012), 2012, : 248 - 253
- [33] Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates ICT INNOVATIONS 2010, 2011, 83 : 102 - +
- [36] Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 264 - 278
- [37] Efficient FPGA Implementation of Secure Hash Algorithm Grostl - SHA-3 Finalist EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 361 - +
- [39] Hardware authentication based on PUFs and SHA-3 2nd round candidates 2010 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, 2010, : 319 - 322
- [40] Hobbit - Smaller But Faster Than A Dwarf: Revisiting Lightweight SHA-3 FPGA Implementations 2016 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG16), 2016,