1 |
NIST Policy on Hash Functions [Internet], Available: http://csrc.nist.gov/groups/ST/hash/policy.html/.
|
2 |
J.C. Jeon, K.J. Seo, and K.W Kim, ""Hardware complexity of SHA-1 and SHA-256 based on area and time analysis," The International Conference on Information Network 2012 (ICOIN), Bali, pp. 557-561, Feb. 2012.
|
3 |
A. Mohamed and A. Nadjia, "SHA-2 hardware core for virtex-5 FPGA," 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), pp. 1-5, Mahdia, Mar. 2015.
|
4 |
M.D. Rote, V.N, D. Selvakumar, "High performance SHA-2 core using the Round Pipelined Technique," 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONNECT), Bangalore, pp. 1-6, July 2015.
|
5 |
J.W. Cha and C.H. Kim., "Design of FPGA Hardware Accelerator for Information Security System," Journal of the Korea Industrial Information Systems Research, vol. 18, no. 2, pp. 1-12, Apr. 2013.
DOI
|
6 |
TTA std. TTAK.KO-12.0011/R1, Hash Function Standard - Part 2 : Hash Function Algorithm Standard (HAS-160), Telecommunications Technology Association(TTA), Dec. 2000.
|
7 |
D.H. Kim, S.W Yoon, and Y.P Lee, "Security for IoT Service," Journal of The Korean Institute of Communication Sciences, vol. 30, no.8, pp.53-59, July 2013.
|
8 |
J.U. Kim and S.H. Jin., "Internet (IoT) Security Technology for Security Threats in Hyper-Connection Environment," Journal of The Korean Institute of Communication Sciences, vol. 34, no.3, pp.57-64, Feb. 2017.
|
9 |
NIST std. FIPS 180-4, Secure Hash Standard(SHS), National Institute of Standard and Technology(NIST), Gaithersburg, M.D., March 2012.
|
10 |
X. Wang, Y.L. Yin, and H. Yu., "Finding collisions in the full SHA-1," in Annual International Cryptology Conference, Springer Berlin Heidelberg, pp. 17-36, Aug. 2005.
|