Grøstl Implementation Guide
暂无分享,去创建一个
[1] Florian Mendel,et al. Symmetric Cryptography , 2009 .
[2] Andreas Peter Burg,et al. Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture , 2012, IACR Cryptol. ePrint Arch..
[3] Peter Schwabe,et al. Faster and Timing-Attack Resistant AES-GCM , 2009, CHES.
[4] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[5] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[6] Karl Scheibelhofer. A Bit-Slice Implementation of the Whirlpool Hash Function , 2007, CT-RSA.
[7] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[8] K. Shadan,et al. Available online: , 2012 .
[9] Yu Sasaki,et al. Byte slicing Grøstl Optimized Intel AES-NI and 8-bit implementations of the SHA-3 finalist Grøstl , 2011, Proceedings of the International Conference on Security and Cryptography.
[10] David Canright,et al. A Very Compact S-Box for AES , 2005, CHES.
[12] Michael Hamburg,et al. Accelerating AES with Vector Permute Instructions , 2009, CHES.