과제정보
연구 과제 주관 기관 : 한국연구재단
참고문헌
- X. Wang, A. C. Yao, and F. Yao [Online]. Available : http://csrc.nist.gov/groups/ST/hash/documents/Wang_SHA1-New-Result.pdf (downloaded 2013, Aug.)
- NIST [Online]. Available : http://csrc.nist.gov/groups/ST/hash/sha-3/index.html (downloaded 2014, Feb.)
- NIST, CSE, Frequently Asked Questions for the Cryptographic Algorithm Validation Program Concerning the Validation of Cryptographic Algorithm Implementations, pp. 5, Jul. 2014.
- P. Pritzker, Patrick D. Gallagher, DRAFT FIPS PUB 202, pp. 17, NIST, May 2014.
- G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, The KECCAK reference version 3.0, pp. 11-22, The KECCAK sponge function family, Jan. 2011.
- G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, KECCAK and the SHA-3 Standardization, pp. 30, NIST, Feb. 2013.
- The KECCAK sponge function family [Online]. Available : http://keccak.noekeon.org/KeccakKAT-3.zip (downloaded 2014, Feb.)
- Lawrence E. Bassaham III, Timothy A. Hall, The Secure Hash Algorithm Validation System(SHAVS), pp. 9, NIST, May 2014.
- J. Bryson, Patrick D. Gallagher, FIPS 180-4(SHS), pp. 21-23, NIST, Mar. 2012.
피인용 문헌
- Implementation of SHA-3 Algorithm Based On ARM-11 Processors vol.25, pp.4, 2015, https://doi.org/10.13089/JKIISC.2015.25.4.749