From post

Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study.

, , , и . PATMOS, том 3728 из Lecture Notes in Computer Science, стр. 591-600. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A VLSI synthesis tool for complementary output delta modulation FIR filters., , , и . Microprocess. Microprogramming, 34 (1-5): 139-142 (1992)Implementation of HSSec: a high-speed cryptographic co-processor., , , и . ETFA, стр. 625-631. IEEE, (2007)High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach., , , , , и . SECRYPT, стр. 126-135. SciTePress, (2012)Spectra using data distribution and covariance modelling., , и . ICASSP, стр. 642-645. IEEE, (1984)A low power fault secure timer implementation based on the Gray encoding scheme., , , и . ICECS, стр. 537-540. IEEE, (2002)Fault secure binary counter design., , и . ICECS, стр. 1659-1662. IEEE, (1999)System-level power optimizing data-flow transformations for multimedia applications realized on programmable multimedia processors., , , и . ICECS, стр. 1733-1736. IEEE, (1999)A Compiler Method for Memory-Conscious Mapping of Applications on Coarse-Grained Reconfigurable Architectures., , и . IPDPS, IEEE Computer Society, (2005)Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study., , , и . PATMOS, том 3728 из Lecture Notes in Computer Science, стр. 591-600. Springer, (2005)A Novel Data-Path for Accelerating DSP Kernels., , , , и . SAMOS, том 3133 из Lecture Notes in Computer Science, стр. 363-372. Springer, (2004)