Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study
暂无分享,去创建一个
[1] Sandra Dominikus,et al. A hardware implementation of MD4-family hash algorithms , 2002, 9th International Conference on Electronics, Circuits and Systems.
[2] Odysseas G. Koufopavlou,et al. Networking Data Integrity: High Speed Architectures and Hardware Implementations , 2003, Int. Arab J. Inf. Technol..
[3] Odysseas G. Koufopavlou,et al. An ultra high speed architecture for VLSI implementation of hash functions , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.
[4] Odysseas G. Koufopavlou,et al. VLSI implementation of the keyed-hash message authentication code for the wireless application protocol , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.
[5] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.