Throughput/Area Trade-Offs of Loop-Unrolling, Functional and Structural Pipeline for Skein Hash Function
暂无分享,去创建一个
[1] Kris Gaj,et al. Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates Implemented Using Xilinx and Altera FPGAs , 2011, CHES.
[2] Willi Meier,et al. VLSI Characterization of the Cryptographic Hash Function BLAKE , 2011, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[3] William P. Marnane,et al. FPGA Implementations of the Round Two SHA-3 Candidates , 2010, 2010 International Conference on Field Programmable Logic and Applications.
[4] Angela Orebaugh,et al. Guide to IPsec VPNs , 2005 .
[5] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[6] Elaine B. Barker,et al. The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .
[7] Stephen A. Thomas,et al. SSL & TLS Essentials: Securing the Web , 2000 .
[8] Pete Loshin. IPv6: Theory, Protocol, and Practice , 2003 .
[9] Marcos Sanchez-Elez,et al. Reconfiguration Strategies for Online Hardware Multitasking in Embedded Systems , 2013, ArXiv.
[10] Kris Gaj,et al. Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs , 2010, CHES.
[11] Stefan Tillich. Hardware Implementation of the SHA-3 Candidate Skein , 2009, IACR Cryptol. ePrint Arch..
[12] M. Anwar Hasan,et al. Implementation of the compression function for selected SHA-3 candidates on FPGA , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW).
[13] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[14] Larry Loeb. Secure Electronic Transactions Introduction and Technical Reference , 1998 .
[15] Stefan Lucks,et al. The Skein Hash Function Family , 2009 .
[16] Martin Feldhofer,et al. Uniform Evaluation of Hardware Implementations of the Round-Two SHA-3 Candidates , 2010 .
[17] Luca Henzen,et al. Developing a Hardware Evaluation Method for SHA-3 Candidates , 2010, CHES.
[18] John Pham,et al. Lightweight Implementations of SHA-3 Candidates on FPGAs , 2011, INDOCRYPT.
[19] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .