Software implementation of Standard Hash Algorithm (SHA-3) Keccak on Intel core-i5 and Cavium Networks Octeon Plus embedded platform
暂无分享,去创建一个
[1] B Guido,et al. Cryptographic sponge functions , 2011 .
[2] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[3] Athar Mahboob,et al. Efficient Hardware Implementations and Hardware Performance Evaluation of SHA-3 Finalists , 2012 .
[4] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[5] Kris Gaj,et al. Lessons Learned from Designing a 65 nm ASIC for Evaluating Third Round SHA-3 Candidates , 2012 .
[6] Marc Stevens,et al. New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis , 2013, EUROCRYPT.
[7] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[8] John Kelsey,et al. Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition , 2012 .
[9] Thomas Pornin. Comparative Performance Review of the SHA-3 Second-Round Candidates , 2010 .
[10] Kishore Kumar,et al. Lightweight Implementations of SHA-3 Finalists on FPGAs , 2012 .
[11] Bernhard Jungk. Evaluation Of Compact FPGA Implementations For All SHA-3 Finalists , 2012 .