Hardware implementation of SHA-3 candidate based on BLAKE-32
暂无分享,去创建一个
[1] Christophe De Cannière,et al. Finding SHA-1 Characteristics: General Results and Applications , 2006, ASIACRYPT.
[2] Marc Stevens,et al. Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities , 2007, EUROCRYPT.
[4] Kris Gaj,et al. Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs , 2010, CHES.
[5] Willi Meier,et al. VLSI Characterization of the Cryptographic Hash Function BLAKE , 2011, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[6] Takeshi Sugawara,et al. Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[7] Patrick Schaumont,et al. Silicon Implementation of SHA-3 Finalists : BLAKE , Grøstl , JH , Keccak and Skein , 2011 .
[8] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[9] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.