共 50 条
- [31] On the Implementation of McEliece with CCA2 Indeterminacy by SHA-3 2014 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2014, : 2804 - 2807
- [32] Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 68 - 78
- [33] Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 131 - +
- [39] Reliable Hardware Architectures for the Third-Round SHA-3 Finalist Grostl Benchmarked on FPGA Platform 2011 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT), 2011, : 325 - 331
- [40] Secure Neural Circuits to Mitigate Correlation Power Analysis on SHA-3 Hash Function 2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 161 - 166