[1] Yiakoumis I I, Papadonikolakis M E, Michail H E, et al. Maximizing the hash function of authentication codes [J]. IEEE Potentials, 2006, 25(2): 9-12.
[2] Wang Xiaoyun, Yin Yiqun Lisa, Yu Hongbo. Finding collisions in the full SHA-1[C]//25th Annual International Cryptology Conference. Santa Barbara, CA, USA, 2005: 1-16.
[3] Michail H, Goutis C. Holistic methodology for designing ultra high-speed SHA-1 hashing cryptographic module in hardware [C]//IEEE International Conference on Electron Devices and Solid-State Circuits. Hong Kong, China, 2008.
[4] Lee Y K, Chan H, Verbauwhede I. Throughput optimized SHA-1 architecture using unfolding transformation [C]//IEEE 17th International Conference on Application-specific Systems, Architectures and Processors. Steamboat Springs, CO, USA, 2006: 354-359
[5] Lee E H, Lee J H, Park Ⅱ H, et al. Implementation of high-speed SHA-1 architecture[J]. IEICE Electronics Express, 2009, 6(16): 1174-1179.
[6] Jung E G, Han D, Lee J G. Low area and high speed SHA-1 implementation [C]//SoC Design Conference. Jeju, Republic of Korea, 2011: 365-367.
[7] Kim J-W, Lee H-U, Won Y. Design for high throughput SHA-1 hash function on FPGA [C]//Fourth International Conference on Ubiquitous and Future Networks. Phuket, Thailand, 2012: 403-404.
[8] Michail H E, Kakarountas A P, Milidonis A S, et al. A top-down design methodology for ultrahigh-performance hashing cores [J]. IEEE Transactions on Dependable and Secure Computing, 2009, 6(4): 255-268.
[9] Jiang L H, Wang Y L, Zhao Q X, et al. Ultra high throughput architectures for SHA-1 hash algorithm on FPGA [C]//Computational Intelligence and Software Engineering. Wuhan, China, 2009.
[10] Nakajima J, Matsui M. Performance analysis and parallel implementation of dedicated hash functions[J]. IEICE Trans Fund Electron Commun Comput Sci, 2003, E86-A(1): 54-63.
[11] Hodjat A, Verbauwhede I. A 21.54 Gbits/s fully pipelined AES processor on FPGA[C]//Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines. Napa, CA, USA, 2004: 308-309.
[12] Wang Z Q, Cao L S. Implementation and comparison of two hash algorithms [C]//Fifth International Conference on Digital Object Identifier. Shiyan, China, 2013: 721-725.
[13] Ratna P, Agung A, Purnamasari P D, et al. QiR(quality in research), analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system [C]//International Conference on Digital Object Identifier. Yogyakarta, Indonesia, 2013: 99-104.