Author:
Athanasiou George S.,Makkas George-Paris,Theodoridis Georgios
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Advancing Cryptographic Security: A Study on SHA-3 Implementation within CRYSTAL-KYBER Key-Encapsulation Mechanism Hardware;2024 Tenth International Conference on Communications and Electronics (ICCE);2024-07-31
2. Designing of Secure Hashing Algorithm 3 (SHA-3) in Bluespec System Verilog and Python;2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE);2024-02-22
3. Comparative Study of Keccak SHA-3 Implementations;Cryptography;2023-11-20
4. A complete SHA-3 hardware library based on a high efficiency Keccak design;2023 IEEE Nordic Circuits and Systems Conference (NorCAS);2023-10-31
5. The Efficiency of High-performance SHA-3 Accelerator on the System Level;2023 International Symposium on Electrical and Electronics Engineering (ISEE);2023-10-19