共 50 条
- [11] Side-Channel Analysis of Six SHA-3 Candidates CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 140 - 157
- [13] Hardware Implementations of the SHA-3 Candidates Shabal and Cube Hash 2009 52ND IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2009, : 515 - 518
- [14] Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 264 - 278
- [15] COMPARISON AND ANALYSIS STUDY OF SHA-3 FINALISTS 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 366 - 371
- [16] Length Extension Attack on Narrow-Pipe SHA-3 Candidates ICT INNOVATIONS 2010, 2011, 83 : 5 - 10
- [18] A Comparison of NIST 2nd Round Candidates' MQ-based Signature Schemes 2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 41 - 46
- [19] Practical Collision Attacks against Round-Reduced SHA-3 Journal of Cryptology, 2020, 33 : 228 - 270
- [20] SHA-2 and SHA-3 Based Sequence Randomization Algorithm 2016 2ND INTERNATIONAL CONFERENCE ON SCIENCE AND TECHNOLOGY-COMPUTER (ICST), 2016,