共 50 条
- [1] Efficient small-sized implementation of the keyed-hash message authentication code EUROCON 2005: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOL 1 AND 2 , PROCEEDINGS, 2005, : 1875 - 1878
- [2] Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function ICECS 2004: 11TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, 2004, : 567 - 570
- [3] VLSI implementation of the keyed-hash message authentication code for the wireless application protocol ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 24 - 27
- [4] Efficient implementation of the keyed-hash message authentication code based on SHA-1 algorithm for mobile trusted computing AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 410 - +
- [5] FPGA-based Implementation Alternatives for Keyed-Hash Message Authentication Code in Networked Embedded Systems 2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), 2009,
- [7] Landau-Ramanujan keyed hash functions for message authentication JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2006, 9 (01): : 1 - 8
- [9] Towards an Energy-Efficient Hash-based Message Authentication Code (HMAC) 2022 IEEE 13TH INTERNATIONAL GREEN AND SUSTAINABLE COMPUTING CONFERENCE (IGSC), 2022, : 167 - 173