ASIC implementations of five SHA-3 finalists | IEEE Conference Publication | IEEE Xplore