[1] MALVONI K,KNEZOVIC’ J.Are your passwords safe:energy-efficient bcrypt cracking with low-cost parallel hardware[C]∥WOOT’14 8th Usenix Workshop on Offensive Technologies Proceedings 23rd USENIX Security Symposium.San Diego:USENIX,2014.doi:10.13140/2.1.3267.0081.
[2] LEE H,PAIK Y,JUN J,et al.High-throughput low-area design of AES using constant binary matrix-vector multiplication[J].Microprocessors and Microsystems,2016,47:360-368.
[3] MICHAIL H E,ATHANASIOU G S,KELEFOURAS V I,et al.Area-throughput rrade-offs for SHA-1 and SHA-256 Hash functions’ pipelined designs[J].Journal of Circuits,Systems and Computers,2016,25(4):1650032.
[4] Li X,Cao C,Li P,et al.Energy-efficient hardware implementation of LUKS PBKDF2 with AES on FPGA[C]∥Trustcom/BigDataSE/ISPA,Tianjin:IEEE,2016:402-409.
[5] 王文功,于松林,李玉峰,等.基于SHA-1算法的硬件设计及实现[J].电子设计工程,2017,25(4):14-17.
[6] 刘恒,黄凯,修思文,等.多种哈希算法的可重构硬件架构设计[J].计算机工程与科学,2016,38(3):411-417.
[7] 龚向东,王佳,张准,等.基于FPGA的AES算法硬件实现优化及IP核应用[J].电子设计工程,2017,25(12):1-5.
[8] FRUHWIRTH C.LUKS on-disk format specification version 1.2.2.[EB/OL].[2017-8-30].https:∥zh.scribd.com/document/352872322/On-Disk-Format.
[9] BOSSI S,VISCONTI A.What users should know about full disk encryption based on LUKS[C]∥International Conference on Cryptology and Network Security.Marrakesh:Springer,2015:225-237.
[10] STEVENS M,KARPMAN P,PEYRIN T.Freestart collision for full SHA-1[C]∥Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2016:459-483.
[11] MICHAIL H,KAKAROUNTAS A,MILIDONIS A,et al.A top-down design methodology for ultrahigh-performance hashing cores[J].IEEE Transactions on Dependable and Secure Computing,2009,6(4):255-268.
[12] MAKKAD R K,SAHU A K.Novel design of fast and compact SHA-1 algorithm for security applications[C]∥IEEE International Conference on Recent Trends in Electronics,Information & Communication Technology(RTEICT).Bangalore:IEEE,2016:921-925.
[13] LEE H,LEE S,KIM J,et al.Parallelizing SHA-1[J].IEICE Electronics Express,2015,12(12):20150371.
[14] VISCONTI A,BOSSI S,RAGAB H,et al.On the weaknesses of PBKDF2[C]∥International Conference on Cryptology and Network Security.Marrakesh:Springer,2015:119-126.
[15] JOHNSON T,ROGGOW D,JONES P H,et al.An FPGA architecture for the recovery of WPA/WPA2 keys[J].Journal of Circuits,Systems and Computers,2015,24(7):1550105.
[16] KUNDI D S,AZIZ A,IKRAM N.A high performance ST-box based unified AES encryption/decryption architecture on FPGA[J].Microprocessors and Microsystems,2016,41:37-46.
[17] KUNDI D S,AZIZ A,KAZMI M.An efficient single unit T-box/T-1-box implementation for 128-bit AES on FPGA[J].Security and Communication Networks,2015,8(9):1725-1731.