Multi-mode operator for SHA-2 hash functions
暂无分享,去创建一个
Arnaud Tisserand | Graham A. Jullien | Nicolas Veyrat-Charvillon | Ryan Glabb | Laurent Imbert | L. Imbert | G. Jullien | Nicolas Veyrat-Charvillon | A. Tisserand | R. Glabb
[1] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[2] Nghi Nguyen,et al. Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 , 2002, ISC.
[3] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[4] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[5] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[6] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[7] Odysseas G. Koufopavlou,et al. Implementation of the SHA-2 Hash Family Standard Using FPGAs , 2005, The Journal of Supercomputing.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Máire O'Neill,et al. Efficient single-chip implementation of SHA-384 and SHA-512 , 2002, 2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings..