共 50 条
- [31] A complete SHA-3 hardware library based on a high efficiency Keccak design 2023 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE, NORCAS, 2023,
- [32] High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm 2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 68 - 71
- [33] Implementation of SHA-3 Candidate Skein on Two Unexplored Multiprocessor Platforms 2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 193 - 196
- [36] Verifying the SHA-3 Implementation from OpenSSL with the Software Analysis Workbench MODEL CHECKING SOFTWARE, SPIN 2022, 2022, 13255 : 97 - 113
- [37] The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3 ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 402 - 431
- [38] An efficient hardware implementation of SHA-3 using 3D cellular automata for secure blockchain-based IoT systems ENGINEERING RESEARCH EXPRESS, 2024, 6 (04):
- [39] Differential Fault Analysis of SHA-3 PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 9462 : 253 - 269
- [40] Hardware authentication based on PUFs and SHA-3 2nd round candidates 2010 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, 2010, : 319 - 322