Author:
Constantin Jeremy H.-F.,Burg Andreas P.,Gurkaynak Frank K.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Comparative Study of Keccak SHA-3 Implementations;Cryptography;2023-11-20
2. A survey on implementation of lightweight block ciphers for resource constraints devices;Journal of Discrete Mathematical Sciences and Cryptography;2020-06-24
3. Study of Flexibility;Domain Specific High-Level Synthesis for Cryptographic Workloads;2019
4. Design Exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V Processor;IEICE Transactions on Information and Systems;2018-11-01
5. Accelerating Hash Computations Through Efficient Instruction-Set Customisation;2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID);2018-01