Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations [chapter]

Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede
2007 Lecture Notes in Computer Science  
doi:10.1007/978-3-540-77535-5_8 fatcat:nv436nlyf5dkzmxxuna66r33lq