1 |
Y. Eslaim, A. Sheikholeami, P,G, Gulak, S. Masui, K. Mukaida, "An Area Efficient Universal Cryptography Processor for Smart Cards", IEEE Trans, on VLSI Systems, vol. 4, pp. 43-56, Jan. 2006.
|
2 |
SHA-1 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-1, www.itl.nist.gov/fipspubs/fip 180-1.htm. 2003.
|
3 |
Charanjit S. Jutla and Anindya C. Patthak, "Provably Good Codes for Hash Function Design", IEEE Trans. on Information Theory, vol. 55, no. 1, pp. 33-45, Jan. 2009.
DOI
ScienceOn
|
4 |
Ju-Dai Hyun, Byeong-Yoon Choi, "Hard- ware Design of HAS-160 Algorithm", Dong-Eui Univ., vol. 37, pp. 415-421, 08. 2002.
|
5 |
Yongje Choi, Mooseop Kim, Taesung Kim, Howon Kim, "Low power implementation of SHA-1 algorithm for RFID system", IEEE Int. Symp. on Consumer Electronics, pp. 1-5, June, 2006.
|
6 |
성수학, "해쉬함수의 최근 동향", http://mathnet. kaist.ac.kr/real/2006/6/text/sungsuhak,pdf, June, 2006.
|
7 |
전신우, 김남영, 정용진, "SHA-1과 HAS-160과 의사 난수 발생기를 구현한 해쉬 프로세서 설계", 한국통신학회 논문지, vol.27, pp. 112-121, 2002,
과학기술학회마을
|
8 |
William Staillings, Cryptography and Network Security, Principle and Practice, 1999.
|
9 |
TTA, "Hash Function Algorithm Standard (HAS-160)", 12. 2000 .
|