On the hardware implementation efficiency of SHA-3 candidates | IEEE Conference Publication | IEEE Xplore