7 papers:
PLDI-2015-Appel #encryption #verification- Verification of a cryptographic primitive: SHA-256 (abstract) (AWA), p. 153.
HPDC-2014-KhorasaniVGB #graph #named- CuSha: vertex-centric graph processing on GPUs (FK, KV, RG, LNB), pp. 239–252.
DATE-2012-GuoSHGHNS #implementation- ASIC implementations of five SHA-3 finalists (XG, MS, SH, DG, MBH, LN, PS), pp. 1006–1011.
DATE-2012-ZohnerKSH #analysis- Side channel analysis of the SHA-3 finalists (MZ, MK, MS, SAH), pp. 1012–1017.
DATE-2011-ChenGSS #analysis #performance- Data-oriented performance analysis of SHA-3 candidates on FPGA accelerated computers (ZC, XG, AS, PS), pp. 1650–1655.
DATE-2011-Cilardo #configuration management #hardware- The potential of reconfigurable hardware for HPC cryptanalysis of SHA-1 (AC), pp. 998–1003.
DATE-DF-2004-DaddaMO #design- The Design of a High Speed ASIC Unit for the Hash Function SHA-256 (384, 512) (LD, MM, JO), pp. 70–75.