טוען...
Finding Bugs in Cryptographic Hash Function Implementations
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the NIST hash function competition, which was use...
שמור ב:
| הוצא לאור ב: | IEEE Trans Reliab |
|---|---|
| Main Authors: | , , , |
| פורמט: | Artigo |
| שפה: | Inglês |
| יצא לאור: |
2018
|
| נושאים: | |
| גישה מקוונת: | https://ncbi.nlm.nih.gov/pmc/articles/PMC6512998/ https://ncbi.nlm.nih.gov/pubmed/31092953 https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1109/TR.2018.2847247 |
| תגים: |
הוספת תג
אין תגיות, היה/י הראשונ/ה לתייג את הרשומה!
|