Loading...
Finding Bugs in Cryptographic Hash Function Implementations
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the NIST hash function competition, which was use...
Na minha lista:
| Udgivet i: | IEEE Trans Reliab |
|---|---|
| Main Authors: | , , , |
| Format: | Artigo |
| Sprog: | Inglês |
| Udgivet: |
2018
|
| Fag: | |
| Online adgang: | https://ncbi.nlm.nih.gov/pmc/articles/PMC6512998/ https://ncbi.nlm.nih.gov/pubmed/31092953 https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1109/TR.2018.2847247 |
| Tags: |
Tilføj Tag
Ingen Tags, Vær først til at tagge denne postø!
|