First Page | Document Content | |
---|---|---|
Date: 2013-02-27 00:13:54Computer architecture Cryptography Computing NIST hash function competition Instruction set architectures Cryptographic hash functions Assembly languages Grstl ARM architecture SHA-2 64-bit computing Addressing mode | SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?Add to Reading ListSource URL: precision.moscito.orgDownload Document from Source WebsiteFile Size: 327,55 KBShare Document on Facebook |