The 12 references in paper P. Klyucharev G., П. Ключарёв Г. (2016) “Реализация криптографических хэш-функций, основанных на обобщенных клеточных автоматах, на базе ПЛИС: производительность и эффективность // The FPGA realization of the general cellular automata based cryptographic hash functions: Performance and effectiveness” / spz:neicon:technomag:y:2014:i:1:p:214-223

1
Klyucharev P.G. Postroenie psevdosluchaynykh funktsiy na osnove obobshchennykh kletochnykh avtomatov [Construction of pseudorandom functions based on generalized cellular automata].Nauka i obrazovanie MGTU im. N.E. Baumana[Science and Education of the Bauman MSTU], 2012, no. 10. DOI: 10.7463/1112.0496381.
(check this in PDF content)
2
Klyucharev P.G. Kriptograficheskie khesh-funktsii, osnovannye na obobshchennykh kletochnykh avtomatakh [Cryptographic hash functions based on generalized cellular automata]. Nauka i obrazovanie MGTU im. N.E. Baumana[Science and Education of the Bauman MSTU], 2013, no. 1. DOI: 10.7463/0113.0534640.
(check this in PDF content)
3
FIPS PUB 180-4. Secure Hash Standard (SHS). U.S. Department of Commerce, National Institute of Standards and Technology (NIST), 2012. 30 p.
(check this in PDF content)
4
Gaj K., Homsirikamol E., Rogawski M. Fair and comprehensive methodology for comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs.Cryptographic Hardware and Embedded Systems, CHES 2010. Springer, 2010, pp. 264{278. (Ser. Lecture Notes in Computer Science; vol. 6225). DOI: 10.1007/978-3-642-15031-918.
(check this in PDF content)
5
Gauravaram P., Knudsen L.R., Matusiewicz K., Mendel F., Rechberger C., Schlaffer M., Thomsen S.S.Gr-stl | a SHA-3 candidate. Submission to NIST. 2011. Available at: http://www.groestl.info/Groestl.pdf, accessed 01.12.2013.
(check this in PDF content)
6
Bertoni G., Daemen J., Peeters M., Van Assche G., Van Keer R.Keccak implementation overview. 2012. Available at: http://keccak.noekeon.org/Keccak-implementation-3.2.pdf, accessed 01.12.2013.
(check this in PDF content)
7
Bertoni G., Daemen J., Peeters M., Van Assche G.Keccak specifications. Submission to NIST (Round 2). 2009. Available at: http://keccak.noekeon.org/Keccak-specifications-2.pdf, accessed 01.12.2013.
(check this in PDF content)
8
Bertoni G., Daemen J., Peeters M., Van Assche G.Keccak sponge function family main document. Submission to NIST (Round 2). 2010. Available at: http://keccak.noekeon.org/ Keccak-main-2.1.pdf, accessed 01.12.2013.
(check this in PDF content)
9
Aumasson J.-P., Henzen L., Meier W., Phan R.C.-W.SHA-3 proposal BLAKE. Submission to NIST. 2010. Available at: https://131002.net/blake/blake.pdf, accessed 01.12.2013.
(check this in PDF content)
10
Ferguson N., Lucks S., Schneier B., Whiting D., Bellare M., Kohno T., Callas J., Walker J. The Skein Hash Function Family. Submisson to NIST. 2008. Available at: http://www.skeinhash.info/sites/default/files/skein1.1.pdf, accessed 01.12.2013.
(check this in PDF content)
11
Strombergson J.Implementation of the Keccak Hash Function in FPGA Devices. 2008. Available at: http://www.strombergson.com/files/KeccakinFPGAs.pdf, accessed 01.12.2013.
(check this in PDF content)
12
Wu H.The Hash Function JH. Submission to NIST (round 3). 2011. Available at: http://www3.ntu.edu.sg/home/wuhj/research/jh/jhround3.pdf, accessed 01.12.2013.
(check this in PDF content)