Skip to content
VuFind
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Sámegiella
Монгол
Language
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
SHA : the secure hash algorith...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Permanent link
SHA : the secure hash algorithm /
56
Bibliographic Details
Main Author:
384997 Stallings, William
Format:
Subjects:
Computer algorithms
Holdings
Description
Similar Items
Staff View
Similar Items
RTL design of SHA-512 processor core for secure message hashing /
by: Chua, Lee Ping, 1982-, et al.
Published: (2008)
RTL design of SHA-512 processor core for secure message hashing [electronic resource] /
by: Chua, Lee Ping, 1982-, et al.
Published: (2008)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview
by: Roman Jasek
Published: (2015-02-01)
Hardware acceleration of secure hash algorithm 3 /
by: Ng, Lai Boon, 1992-, author 629460, et al.
Published: (2020)