Exploiting Vulnerabilities in Cryptographic Hash Functions...

Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware

Cilardo, Alessandro, Mazzocca, Nicola
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
8
Language:
english
Journal:
IEEE Transactions on Information Forensics and Security
DOI:
10.1109/TIFS.2013.2256898
Date:
May, 2013
File:
PDF, 1.58 MB
english, 2013
Conversion to is in progress
Conversion to is failed