1. Evaluating critical security issues of the IoT world: Present and future challenges;Frustaci;IEEE Internet Things J.,2018
2. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions;Dworkin,2015
3. Finding collisions in the full SHA-1;Wang,2005
4. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths;Barker,2011
5. Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing;Akin,2010