A low-power and high-throughput implementation of the SHA-1 hash function
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Odysseas G. Koufopavlou,et al. VLSI implementation of the keyed-hash message authentication code for the wireless application protocol , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.
[3] Chen Feng-xia. Wireless application protocol architecture and applications , 2006 .
[4] Bojani,et al. HASH ALGORITHMS FOR CRYPTOGRAPHIC PROTOCOLS : FPGA IMPLEMENTATIONS , 2002 .
[5] Odysseas G. Koufopavlou,et al. Networking Data Integrity: High Speed Architectures and Hardware Implementations , 2003, Int. Arab J. Inf. Technol..
[6] Elaine B. Barker,et al. The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .
[7] Sandra Dominikus,et al. A hardware implementation of MD4-family hash algorithms , 2002, 9th International Conference on Electronics, Circuits and Systems.
[8] Odysseas G. Koufopavlou,et al. An ultra high speed architecture for VLSI implementation of hash functions , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.
[9] Todor Cooklev,et al. Air Interface for Fixed Broadband Wireless Access Systems , 2004 .