Loading...

Finding Bugs in Cryptographic Hash Function Implementations

Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the NIST hash function competition, which was use...

Fuld beskrivelse

Na minha lista:
Bibliografiske detaljer
Udgivet i:IEEE Trans Reliab
Main Authors: Mouha, Nicky, Raunak, Mohammad S, Kuhn, D. Richard, Kacker, Raghu
Format: Artigo
Sprog:Inglês
Udgivet: 2018
Fag:
Online adgang:https://ncbi.nlm.nih.gov/pmc/articles/PMC6512998/
https://ncbi.nlm.nih.gov/pubmed/31092953
https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1109/TR.2018.2847247
Tags: Tilføj Tag
Ingen Tags, Vær først til at tagge denne postø!