[1]
|
Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages
The Journal of Supercomputing,
2023
DOI:10.1007/s11227-022-04750-7
|
|
|
[2]
|
Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages
The Journal of Supercomputing,
2022
DOI:10.1007/s11227-022-04750-7
|
|
|
[3]
|
HACLxN: Verified Generic SIMD Crypto (for all your favourite platforms)
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
2020
DOI:10.1145/3372297.3423352
|
|
|
[4]
|
HACLxN: Verified Generic SIMD Crypto (for all your favourite platforms)
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
2020
DOI:10.1145/3372297.3423352
|
|
|
[5]
|
Parallelizable Message Preprocessing for Merkle-Damgård Hash Functions
2018 International Symposium on Information Theory and Its Applications (ISITA),
2018
DOI:10.23919/ISITA.2018.8664401
|
|
|
[6]
|
Information Technology - New Generations
Advances in Intelligent Systems and Computing,
2018
DOI:10.1007/978-3-319-54978-1_26
|
|
|
[7]
|
SoK
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop - APKC '18,
2018
DOI:10.1145/3197507.3197511
|
|
|
[8]
|
SoK
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop,
2018
DOI:10.1145/3197507.3197511
|
|
|
[9]
|
Optimization of Tree Modes for Parallel Hash Functions: A Case Study
IEEE Transactions on Computers,
2017
DOI:10.1109/TC.2017.2693185
|
|
|
[10]
|
Information Technolog: New Generations
Advances in Intelligent Systems and Computing,
2016
DOI:10.1007/978-3-319-32467-8_18
|
|
|
[11]
|
Secure IT Systems
Lecture Notes in Computer Science,
2016
DOI:10.1007/978-3-319-47560-8_12
|
|
|
[12]
|
A j-Lanes Tree Hashing Mode and j-Lanes SHA-256
Journal of Information Security,
2013
DOI:10.4236/jis.2013.41002
|
|
|