References
- Xiaoyun Wang, X.L., Feng, D., Yu, H.: Collisions for hash functions MD4, MD5,HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199, pp. 1–4 (2004), http://eprint.iacr.org/2004/199
- Szydlo, M.: SHA-1 collisions can be found in 263 operations. Crypto BytesTechnical Newsletter (2005)
- Stevens, M.: Fast collision attack on MD5. ePrint-2006-104, pp. 1–13 (2006), http://eprint.iacr.org/2006/104.pdf
- Federal Register / Vol. 72, No. 212 / Friday, November 2 (2007), Notices, http://csrc.nist.gov/groups/ST/hash/documents/FR_Notice_Nov07.pdf
- National Institute of Standards and Technology (NIST).SHA-3 Winner announcement, http://www.nis.gov/itl/csd/sha-100212.cfm
- F. Henriquez, N. Saqib, D. Prez, and C. Kaya Koc; “Cryptographic Algorithms on Reconfigurable Hardware” Springer, November 2006.
- Kuon, I.; Tessier, R.; Rose, J. FPGA Architecture: Survey and Challenges. Found. Trends Electron. Des. Autom. 2007, 2, 135–253.
- Xilinx 7 Series Overview; Datasheet DS180; Xilinx. Available online: http://www.xilinx.Com/support/documentation/datasheets/ds1807SeriesOverview.pdf.
- G. Bertoni, J. Daemen, M. Peeters, G. Assche “The Keccak SHA-3 Submission version 3” pp. 1-14, (2011), http://Keccak.noekeon.org/Keccak–reference-3.0.pdf
- “XPower Tutorial FPGA Design”, [online]. Available at: http.xilinx.com/pub/documentation/tutorials/xpowerfpgatutorial.pdf