Author:
Henderson Elena R.,Henderson Jessie M.,Oxford William V.,Thornton Mitchell A.
Reference25 articles.
1. Understanding Cryptography
2. The first 30 years of cryptographic hash functions and the NIST SHA-3 competition;Preneel,2010
3. Hash functions: Theory, attacks, and applications;Mironov;Microsoft Research, Silicon Valley Campus,2005
4. Blockchain challenges and opportunities: a survey
5. Usability, security and trust in password managers: A quest for user-centric properties and features