Hardware implementation analysis of SHA-3 candidates algorithms | IEEE Conference Publication | IEEE Xplore