1. Athanasiou, G.S., Makkas, G., Theodoridis, G.: High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm. In: 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP), Athens, pp. 538–541 (2014)
2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak reference. PDF file.
http://keccak.noekeon.org
. Accessed March 2020
3. Bertoni, G., Daemen, J., Peeters, M., Van Assche G.: The Keccak sponge function family.
http://keccak.noekeon.org
. Accessed March 2020
4. Gaj, K., Homsirikamol, E., Rogawski, M., Shahid, R., Sharif, M.U.: Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using Xilinx and Altera FPGAs. In: The Third SHA-3 Candidate Conference. Available: IACR Cryptology ePrint Archive, 2012, p. 368 (2012)
5. Gaj, K., Kaps, J.P., Amirineni, V., Rogawski, M., Homsirikamol, E., Brewster B.Y.: ATHENa – automated tool for hardware EvaluatioN: toward fair and comprehensive benchmarking of cryptographic hardware using FPGAs. In: 20th International Conference on Field Programmable Logic and Applications, Milano, Italy (2010)