Author:
Ghoshal Sandip,Bandyopadhyay Pradosh,Roy Surojit,Baneree Monalisa
Reference4 articles.
1. Kahate A (2013) Cryptography and network security, 3rd edn. McGraw-Hill
2. Stallings W (2017) Cryptography and network security. Pearson
3. Khan E, El-Kharashi MW, Gebali F, Abd-El-Barr M (2007) Design and performance analysis of a unified, reconfigurable HMAC-hash unit. IEEE Trans Circuits Syst I Regul Pap 54(12):2683–2695.
https://doi.org/10.1109/tcsi.2007.910539
4. Bettilyon TE (2017) An introduction to hashing in the era of machine learning. Published by the researchers of Google and MIT, Dec 2017
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献