1 |
NIST Std. FIPS-197, Advanced Encryption Standard, National Institute of Standard and Technology (NIST), 2001.
|
2 |
KS X 1213, 128 bit Block Encryption Algorithm ARIA, Korean Agency for Technology and Standards, 2004.
|
3 |
R. Rivest, A. Shamir and L. Adleman, "A method for obtaining Digital Signatures and Public-Key Crypto-system," Communications of Association for Computing Machinery (ACM), vol.21, no.2, pp.120-126, 1978. DOI:10.1145/359340.359342
DOI
|
4 |
NIST Std. FIPS PUB 186-2, Digital Signature Mechanism with Appendix (Part 3) Korean Certificate-based Digital Signature Algorithm using Elliptic Curve, Telecommu-nications Technology Association, 2012.
|
5 |
TTA std. TTAK.KO-12.0011/R1, Hash Function Standard-Part2: Hash Function Algorithm Standard (HAS-160), Telecommu-nications Technology Association (TTA), 2000.
|
6 |
NIST std. FIPS 180-2, Secure Hash Standard (SHS), National Institute of Standard and Technology (NIST), 2001.
|
7 |
National Institute of Standards and Technology. FIPS PUB 202-SHA3 Standard: Permutation-Based Hash and Extendable-Output function, 2015.
|
8 |
D. S. Kim and K. W. Shin, "Analysis of Optimal Design conditions for SHA3-512 Hash Function," Proceedings of 2018 2nd Conference of the Korea Institute of Information and Communication Engineering, vol.22, no.2, pp.187-189, Oct. 2018.
|
9 |
D. S. Kim and K. W. Shin, "A Hardware Implementation of SHA3 Hash Processor using Cortex-M0," Proceedings of 2019 International Conference on Electronics, Information, and Communication (ICEIC 2019), Accepted.
|
10 |
M. M. Wong, J. Haj-Yahya, S. Sau and A. Chattopadhyay," A New High Throughput and Area Efficient SHA-3 Implementation," Proceedings of 2018 IEEE International Symposium on Circuits and Systems (ISCAS), Florence, pp.1-5, 2018.
|
11 |
G. Provelengios et al, "FPGA-Based Design Approaches of Keccak Hash Function," Proceedings of 15th Euromicro Conference on Digital System Design, Izmir, Turcky, pp.648-653, 2012. DOI:10.1109/DSD.2012.63
DOI
|
12 |
S. Bayat-Sarma et al, "Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm," IEEE Transactions on CAD of Integrated Circuit and System, vol.33, no.7, pp.1105-1109, 2014. DOI:10.1109/TCAD.2014.2307002
DOI
|
13 |
B. Y. Choi, "Efficient Hardware Design of Hash Processor Supporting SHA-3 and SHAKE256 Algorithms," Journal of the Korea Institute of Information and Communication Engineering, vol.21, no.6, pp.1075-1082, 2017. DOI:10.6109/jkiice.2017.21.6.1075
DOI
|
14 |
P. Barreto and V. Rijmen, "The Whirlpool Hashing Function," pp.1-20, 2003.
|