共 50 条
- [21] Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 279 - +
- [23] Two Step Power Attack on SHA-3 Based MAC PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEM (MIXDES 2018), 2018, : 209 - 214
- [24] Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 397 - 412
- [25] Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 220 - 251
- [26] FPGA Implementations of SHA-3 Candidates: CubeHash, Grostl, LANE, Shabal and Spectral Hash PROCEEDINGS OF THE 2009 12TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN, ARCHITECTURES, METHODS AND TOOLS, 2009, : 783 - 790
- [27] Data-Oriented Performance Analysis of SHA-3 Candidates on FPGA Accelerated Computers 2011 DESIGN, AUTOMATION & TEST IN EUROPE (DATE), 2011, : 1650 - 1655
- [28] Low Power and Pipelined Secure hashing Algorithm-3(SHA-3) 2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
- [29] SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems 2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 393 - 398
- [30] Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3 ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 645 - 674