Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques.

Autor: AL-ODAT, ZEYAD A.1 zeyad.alodat@ndsu.edu, ALI, MAZHAR2 mazhar@cuiatd.edu.pk, ABBAS, ASSAD2 assadabbas@comsats.edu.pk, KHAN, SAMEE U.3 skhan@ece.msstate.edu
Zdroj: ACM Computing Surveys. Sep2021, Vol. 53 Issue 5, p97-132. 36p.
Databáze: Business Source Ultimate