![](/img/cover-not-exists.png)
Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware
Cilardo, Alessandro, Mazzocca, NicolaVolume:
8
Language:
english
Journal:
IEEE Transactions on Information Forensics and Security
DOI:
10.1109/TIFS.2013.2256898
Date:
May, 2013
File:
PDF, 1.58 MB
english, 2013