Author:
McEvoy R.P.,Crowe F.M.,Murphy C.C.,Marnane W.P.
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. LiteHash: Hash Functions for Resource-Constrained Hardware;ACM Transactions on Embedded Computing Systems;2024-07-09
2. Bitcoin Mining Technology;Handbook of Digital Currency;2024
3. An Unrolled and Pipelined Architecture for SHA2 Family of Hash Functions on FPGA;2023 16th International Conference on Information Security and Cryptology (ISCTürkiye);2023-10-18
4. UVM Components for the Secure Hash 512 Algorithm;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06
5. High Throughput and Energy Efficient SHA-2 ASIC Design for Continuous Integrity Checking Applications;2023 IEEE European Test Symposium (ETS);2023-05-22