Author:
Hassan Muhammad,Khalid Ayesha,Chattopadhyay Anupam,Rechberger Christian,Guneysu Tim,Paar Christof
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Performance Analysis of Secure Hash Algorithm-2 (SHA-) and Implementing on FPGA;ICT with Intelligent Applications;2021-12-06
2. Introduction and Background;Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers;2021-11-17
3. On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study;Topics in Cryptology – CT-RSA 2021;2021
4. On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Computing;Wireless Personal Communications;2019-05-14
5. Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?;Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation;2018-07-15