|
[1] H. L. Pham, T. H. Tran, T. D. Phan, V. T. D. Le, D. K. Lam, and Y. Nakashima, “Double SHA-256 hardware architecture with compact message expander for Bitcoin mining,” IEEE Access, vol. 8, pp. 139634–139646, July 28, 2020. [2] L. Li, S. Lin, S. Shen, K. Wu, X. Li, and Y. Chen, “High-throughput and area-efficient fully-pipelined hashing cores using BRAM in FPGA,” Microprocessors Microsyst., vol. 67, pp. 922019–922082, Jun. 2019. [3] Yin Zhang, Zhangqing He, Meilin Wan, Muwen Zhan, Ming Zhang, Kuang Peng, Min Song, and Haoshuang Gu, “A New Message Expansion Structure for Full Pipeline SHA-2,” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 68, NO. 4, APRIL 2021 [4] Xilinx, Block Memory Generator v8.3, April 5, 2017 [5] Xilinx, UltraScale Architecture Configurable Logic Block, February 28, 2017 [6] A. R. Zamanov, V. A. Erokhin, and P. S. Fedotov, “Asic-resistant hash functions,” IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pages 394–396. IEEE, 2018. [7] Mohammad Peyraviana, Allen Roginskya, Ajay Kshemkalyanib, “On Probabilities of Hash Value Matches,” March. 1998 [8] Xilinx, UltraScale Architecture and Product Data Sheet: Overview, February 7, 2022 [9] Xilinx, UltraScale Architecture Configurable Logic Block User Guide, February 28, 2017 [10] Radiantblockchain.org, Radiant: A Peer-to-Peer Digital Asset System, August 11, 2022 [11] Xilinx, UltraScale+ FPGAs Product Selection Guide, June 20, 2023 [12] Xilinx, UltraScale Architecture DSP Slice User Guide, August 20, 2021 [13] Quynh H. Dang Gaithersburg, Penny Pritzker, Willie E. May, Charles H. Romine, “SECURE HASH STANDARD,” Federal Inf. Process. Stds. (NIST FIPS) - 180-4, August 4, 2015 [14] Xilinx, UltraFast Design Methodology Guide for FPGAs and SoCs, June 07, 2023 [15] Xilinx, UltraFast Design Methodology Timing Closure Quick Reference Guide, November 30, 2022 [16] ZEYAD A. AL-ODAT, MAZHAR ALI, and ASSAD ABBAS, SAMEE U. KHAN, “Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques,” ACM Computing Surveys, Vol. 53, No. 5, Article 97, September 2020.
|