共 50 条
- [1] Hardware authentication based on PUFs and SHA-3 2nd round candidates 2010 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, 2010, : 319 - 322
- [3] On security arguments of the second round SHA-3 candidates International Journal of Information Security, 2012, 11 : 103 - 120
- [4] Security Reductions of the Second Round SHA-3 Candidates INFORMATION SECURITY, 2011, 6531 : 39 - +
- [6] Lightweight Implementations of SHA-3 Candidates on FPGAs PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 270 - 289
- [7] Integral Distinguishers of Some SHA-3 Candidates CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 106 - +
- [8] Developing a Hardware Evaluation Method for SHA-3 Candidates CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 248 - +
- [9] The Intel AES Instructions Set and the SHA-3 Candidates ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 162 - +
- [10] Meet-in-the-Middle Attacks on SHA-3 Candidates FAST SOFTWARE ENCRYPTION, 2009, 5665 : 228 - 245