A compact FPGA-based processor for the Secure Hash Algorithm SHA-256
暂无分享,去创建一个
Rommel García | Ignacio Algredo-Badillo | Miguel Morales-Sandoval | Claudia Feregrino Uribe | René Cumplido | M. Morales-Sandoval | I. Algredo-Badillo | C. F. Uribe | R. Cumplido | Rommel García
[1] Dong Kyue Kim,et al. Design and Implementation of Crypto Co-processor and Its Application to Security Systems , 2005, CIS.
[2] Jaecheol Ryou,et al. Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing , 2009, Inscrypt.
[3] Ryan Kastner,et al. Managing Security in FPGA-Based Embedded Systems , 2008, IEEE Design & Test of Computers.
[4] Todor Mladenov,et al. Implementation of reconfigurable SHA-2 hardware core , 2008, APCCAS 2008 - 2008 IEEE Asia Pacific Conference on Circuits and Systems.
[5] John Kelsey,et al. Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition , 2011 .
[6] Ingrid Verbauwhede,et al. Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations , 2007, WISA.
[7] Jérémie Crenne,et al. Efficient key-dependent message authentication in reconfigurable hardware , 2011, 2011 International Conference on Field-Programmable Technology.
[8] 장훈,et al. [서평]「Computer Organization and Design, The Hardware/Software Interface」 , 1997 .
[9] Xiaolin Cao,et al. A Compact SHA-256 Architecture for RFID Tags , 2011 .
[10] Odysseas G. Koufopavlou,et al. On the hardware implementations of the SHA-2 (256, 384, 512) hash functions , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[11] Philip Heng Wai Leong,et al. An FPGA Based SHA-256 Processor , 2002, FPL.
[12] Bart Preneel,et al. Security Reductions of the Second Round SHA-3 Candidates , 2010, ISC.
[13] Odysseas G. Koufopavlou,et al. Implementation of the SHA-2 Hash Family Standard Using FPGAs , 2005, The Journal of Supercomputing.
[14] CumplidoRené,et al. A compact FPGA-based processor for the Secure Hash Algorithm SHA-256 , 2014 .
[15] Bing Wang,et al. Hardware Implementation of Hash Functions , 2012 .
[16] Shay Gueron. Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors , 2012, 2012 Ninth International Conference on Information Technology - New Generations.
[17] Miroslav Knezevic,et al. Hardware design for Hash functions , 2010, Secure Integrated Circuits and Systems.
[18] Johannes Wolkerstorfer,et al. Hardware Implementation of Symmetric Algorithms for RFID Security , 2008 .
[19] Arnaud Tisserand,et al. Multi-mode operator for SHA-2 hash functions , 2007, J. Syst. Archit..
[20] Jaecheol Ryou,et al. Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing , 2012, Personal and Ubiquitous Computing.
[21] David A. Patterson,et al. Computer Organization and Design, Fourth Edition, Fourth Edition: The Hardware/Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design) , 2008 .
[22] Martin Feldhofer,et al. A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.
[23] Cliff Wang,et al. Introduction to Hardware Security and Trust , 2011 .