Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform
暂无分享,去创建一个
[1] William E. Burr,et al. Cryptographic hash standards: where do we go from here? , 2006, IEEE Security & Privacy.
[2] Stefan Lucks,et al. A Failure-Friendly Design Principle for Hash Functions , 2005, ASIACRYPT.
[3] Mohamed El-Hadedy,et al. Low Area Implementation of the Hash Function “Blue Midnight Wish 256” for FPGA Platforms , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.
[4] Antoine Joux,et al. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.
[5] Odysseas G. Koufopavlou,et al. Implementation of the SHA-2 Hash Family Standard Using FPGAs , 2005, The Journal of Supercomputing.
[6] Danilo Gligoroski,et al. A Document describing all modifications made on the Blue Midnight Wish cryptographic hash function before entering the Second Round of SHA-3 hash competition , 2009 .
[7] Máire O'Neill,et al. Efficient single-chip implementation of SHA-384 and SHA-512 , 2002, 2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings..