[1] |
Douglas R.Cryptology theory and practice[M].Feng Guodeng, Translation.Beijing:Electronics Industry Press,2003.(in Chinese)
|
[2] |
Wang Xiaoyan,Yang Xianwen.Optimization design and implementation of SM3 algorithm based on FPGA[J].Computer Engineering,2012,38(6):244246.(in Chinese)
|
[3] |
Jaewoon K,Huung L,Youjip W.Design for high throughput SHA1 Hash function on FPGA[C]∥Proc of 2012 4th International Conference on Ubiquitous and Future Networks (ICUFN), 2012:403404.
|
[4] |
Zhang Qian,LI Shuguo.Design and implementation of SM3 algorithm in ASIC[J].Microelectronics & Computer,2014,31(9):143146.(in Chinese)
|
[5] |
Ding Dongping,Gao Xianwei.Design and implementation of SM3 algorithm on FPGA[J].Microcomputer & Its Applications,2012,31(5):2628.(in Chinese)
|
[6] |
Xue Ye,Hu Aiqun.Optimized SHA1 Hash function implemented on FPGA[J].Journal of Southeast University (English Edition),2014,(1):1316.
|
[7] |
Chen Huafeng.Highspeed SHA256 algorithm implementation[J].Journal of Zhejiang University (Science Edition),2009,36(6):675678.(in Chinese)
|
[8] |
Li Miao, Xu Jinfu, Yang Xiaohui,et al.Design and implementation of reconfigurable security Hash algorithms based on FPGA[C] ∥Proc of International Conference on Information Engineering,2009:381384.
|
[9] |
Shen Yanzhao.Analysis of SM3 algorithm[D].Shanghai:Donghua University,2013.(in Chinese)
|
[10] |
Zheng Qiang, Gao Neng, Zhang Lingchen, et al. Design and implementation of dynamic password card based on SM3 algorithm[J].Computer Applications and Software,2013,30(2):1417.(in Chinese)
|
[11] |
Rivest R.The MD5 messagedigest algorithm:RFC1321[S].1992.
|
[12] |
National Institute of Standards and Technology.Announcing the secure Hash standard:FIPS 1801[S].2001.
|
[13] |
National Institute of Standards and Technology.Announcing the secure Hash standard:FIPS 1802[S].2002.
|
[14] |
Office of Security Commercial Code Administration.SM3 cryptographic Hash algorithm[S].2010.(in Chinese)
|
[15] |
Pan Yun.Development tutorial of CKCPU embedded system[M].Beijing:Science Press,2011.(in Chinese)
|
[16] |
Hong Qi, Zhou Qinqin, Wang Yongliang, et al.Research and hardware realization of MD5 algorithm based on Hash function[J].Computer Engineering,2013,39(3):137141.(in Chinese)
|
|
附中文参考文献:
|
[1] |
(加)Douglas R等著.密码学原理与实践[M].冯登国译.北京:电子工业出版社,2003.
|
[2] |
王晓燕,杨先文.基于FPGA的SM3算法优化设计与实现[J].计算机工程,2012,38(6):244246.
|
[4] |
张倩,李树国.SM3杂凑算法的ASIC设计和实现[J].微电子学与计算机,2014,31(9):143146.
|
[5] |
丁冬平,高献伟.SM3算法的FPGA设计与实现[J].微型机与应用,2012,31(5):2628.
|
[7] |
陈华锋.高速SHA256算法硬件实现[J].浙江大学学报(理学版),2009,36(6):675678.
|
[9] |
申延召.SM3密码杂凑算法分析[D].上海:东华大学,2013.
|
[10] |
郑强,高能,张令臣,等.基于SM3算法的动态口令卡的设计与实现[J].计算机应用与软件,2013,30(2):1417.
|
[14] |
国家密码管理局.SM3密码杂凑算法[S].2010.
|
[15] |
潘赟.CKCPU嵌入式系统开发教程[M].北京:科学出版社,2011.
|
[16] |
洪琪,周琴琴,王永亮,等.基于Hash函数的MD5算法研究和硬件实现[J].计算机工程,2013,39(3):137141.
|