7 papers:
- PLDI-2015-Appel #encryption #verification
- Verification of a cryptographic primitive: SHA-256 (abstract) (AWA), p. 153.
- HPDC-2014-KhorasaniVGB #graph #named
- CuSha: vertex-centric graph processing on GPUs (FK, KV, RG, LNB), pp. 239–252.
- DATE-2012-GuoSHGHNS #implementation
- ASIC implementations of five SHA-3 finalists (XG, MS, SH, DG, MBH, LN, PS), pp. 1006–1011.
- DATE-2012-ZohnerKSH #analysis
- Side channel analysis of the SHA-3 finalists (MZ, MK, MS, SAH), pp. 1012–1017.
- DATE-2011-ChenGSS #analysis #performance
- Data-oriented performance analysis of SHA-3 candidates on FPGA accelerated computers (ZC, XG, AS, PS), pp. 1650–1655.
- DATE-2011-Cilardo #configuration management #hardware
- The potential of reconfigurable hardware for HPC cryptanalysis of SHA-1 (AC), pp. 998–1003.
- DATE-DF-2004-DaddaMO #design
- The Design of a High Speed ASIC Unit for the Hash Function SHA-256 (384, 512) (LD, MM, JO), pp. 70–75.