共 17 条
- [1] YU Bin, LI Xiaofeng, ZHAO He, Structured data management method based on blockchain storage expansion, Transactions of Beijing University of Technology, 39, 11, pp. 1160-1166, (2019)
- [2] CHEN Zhong, GUAN Zhi, Application and challenge of domestic cryptosystem in block chain, China Information Security, 11, pp. 71-73, (2019)
- [3] WANG Xiaoyun, Review of cryptographic hashing algorithms, Research on Information Security, 1, 1, pp. 19-30, (2015)
- [4] FIPS N., 180-2: Secure hash standard (SHS), (2012)
- [5] DWORKIN M J., SHA-3 standard: permutation-based hash and extendable-output functions
- [6] WANG Xiaoyun, YU Hongbo, SM3 cryptographic hash algorithm, Research on Information Security, 2, 11, pp. 983-994, (2016)
- [7] ZHANG Qian, LI Shuguo, ASIC design and implementation of SM3 hash algorithm, Microelectronics & Computer, 31, 9, pp. 143-146, (2014)
- [8] DU Xiaojing, LI Shuguo, UNIVERSITY T., The high-throughput ASIC implementation of SHA-1 algorithm, Microelectronics & Computer, 7, pp. 1481-1487, (2016)
- [9] HONG Qi, ZHOU Qinqin, WANG Yongliang, Et al., Research and hardware implementation of MD5 algorithm based on Hash function, Computer Engineering, 39, 3, pp. 137-141, (2013)
- [10] MESTIRI H, KAHRI F, BOUALLEGUE B, Et al., Efficient FPGA hardware implementation of secure hash function SHA-2, International Journal of Computer Network and Information Security, 7, 1, (2014)