共 50 条
- [43] Algebraic Fault Analysis of SHA-3 PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 151 - 156
- [44] Performance Analysis of Modified SHA-3 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 904 - 910
- [45] SHA-3 Implementation Using ReRAM based In-Memory Computing Architecture PROCEEDINGS OF THE EIGHTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED), 2017, : 325 - 330
- [46] Efficient FPGA Implementation of Secure Hash Algorithm Grostl - SHA-3 Finalist EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 361 - +
- [47] IMPROVING THE SECURITY OF MOBILE IPV6 SIGNALLING USING KECCAK / SHA-3 JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2021, 16 (03): : 2312 - 2325
- [48] SHA-2 and SHA-3 Based Sequence Randomization Algorithm 2016 2ND INTERNATIONAL CONFERENCE ON SCIENCE AND TECHNOLOGY-COMPUTER (ICST), 2016,
- [49] Improving FPGA based SHA-3 structures 2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 159 - 159
- [50] ASIC Implementations of Five SHA-3 Finalists DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 1006 - 1011