An Optimized Method of Hardware Implementation for LHash in the Embedded System
暂无分享,去创建一个
Weike Wang | Qiang Hao | Xiaobing Zhang | Xiang Wang | Bing Xu | Zongmin Zhao | Zhun Zhang | Pei Du | Yuntong Tian
[1] Wouter Joosen,et al. Code injection in C and C++: a survey of vulnerabilities and countermeasures , 2004 .
[2] Jun Muramatsu,et al. Corrections to "Hash Property and Fixed-Rate Universal Coding Theorems" , 2012, IEEE Trans. Inf. Theory.
[3] Jun Muramatsu,et al. Hash Property and Fixed-Rate Universal Coding Theorems , 2010, IEEE Transactions on Information Theory.
[4] Andrey Bogdanov,et al. SPONGENT: The Design Space of Lightweight Cryptographic Hashing , 2011, IEEE Transactions on Computers.
[5] Ignacio Algredo-Badillo,et al. Design and Implementation of a Non-pipelined MD5 Hardware Architecture Using a New Functional Description , 2008, IEICE Trans. Inf. Syst..
[6] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[7] Bin Xu,et al. A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems , 2018, J. Univers. Comput. Sci..
[8] Patrick Schaumont,et al. The Technology Dependence of Lightweight Hash Implementation Cost , 2011 .
[9] Shuang Wu,et al. LHash: A Lightweight Hash Function , 2013, Inscrypt.
[10] Andrey Bogdanov,et al. Hash Functions and RFID Tags: Mind the Gap , 2008, CHES.
[11] George Varghese,et al. Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).