Cost-Efficient SHA Hardware Accelerators
暂无分享,去创建一个
Stamatis Vassiliadis | Ricardo Chaves | Leonel Sousa | Georgi Kuzmanov | L. Sousa | R. Chaves | S. Vassiliadis | G. Kuzmanov
[1] Vlastimil Klíma. Finding MD5 Collisions - a Toy For a Notebook , 2005, IACR Cryptol. ePrint Arch..
[2] Odysseas G. Koufopavlou,et al. Implementation of the SHA-2 Hash Family Standard Using FPGAs , 2005, The Journal of Supercomputing.
[3] Odysseas G. Koufopavlou,et al. On the hardware implementations of the SHA-2 (256, 384, 512) hash functions , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[4] Kris Gaj,et al. A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512 , 2004, CT-RSA.
[5] Stamatis Vassiliadis,et al. The MOLEN polymorphic processor , 2004, IEEE Transactions on Computers.
[6] Philip Heng Wai Leong,et al. An FPGA Based SHA-256 Processor , 2002, FPL.
[7] Stamatis Vassiliadis,et al. The MOLEN ρμ-coded processor , 2001 .
[8] Stamatis Vassiliadis,et al. The MOLEN rho-mu-Coded Processor , 2001, FPL.
[9] Luigi Dadda,et al. The design of a high speed ASIC unit for the hash function SHA-256 (384, 512) , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[10] Luigi Dadda,et al. Quasi-pipelined hash circuits , 2005, 17th IEEE Symposium on Computer Arithmetic (ARITH'05).
[11] Luigi Dadda,et al. An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512) , 2004, GLSVLSI '04.
[12] Francis M. Crowe,et al. Optimisation of the SHA-2 family of hash functions on FPGAs , 2006, IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures (ISVLSI'06).
[13] Stamatis Vassiliadis,et al. Reconfigurable memory based AES co-processor , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[14] Constantinos E. Goutis,et al. Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study , 2005, PATMOS.
[15] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[16] Stamatis Vassiliadis,et al. Improving SHA-2 Hardware Implementations , 2006, CHES.
[17] Máire O'Neill,et al. Efficient single-chip implementation of SHA-384 and SHA-512 , 2002, 2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings..
[18] Nghi Nguyen,et al. Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 , 2002, ISC.
[19] Odysseas G. Koufopavlou,et al. Networking Data Integrity: High Speed Architectures and Hardware Implementations , 2003, Int. Arab J. Inf. Technol..
[20] Stamatis Vassiliadis,et al. Rescheduling for Optimized SHA-1 Calculation , 2006, SAMOS.
[21] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.