Throughput Optimized SHA-1 Architecture Using Unfolding Transformation
暂无分享,去创建一个
[1] Akashi Satoh,et al. ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[2] T. S. B. Sudarshan,et al. ASIC implementation of a unified hardware architecture for non-key based cryptographic hash primitives , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[3] Zhou Tong,et al. An efficient ASIC implementation of SHA-1 engine for TPM , 2004, The 2004 IEEE Asia-Pacific Conference on Circuits and Systems, 2004. Proceedings..
[4] Keshab K. Parhi,et al. VLSI digital signal processing systems , 1999 .
[5] Constantinos E. Goutis,et al. A low-power and high-throughput implementation of the SHA-1 hash function , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[6] Odysseas G. Koufopavlou,et al. Networking Data Integrity: High Speed Architectures and Hardware Implementations , 2003, Int. Arab J. Inf. Technol..