Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and correctness of cryptographic implementations, and...
Main Authors: | Dexi Wang, Yu Jiang, Houbing Song, Fei He, Ming Gu, Jiaguang Sun |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/7924403/ |
Similar Items
-
The coordination problem in an real time control algorithm of urban traffic
by: Werner Kraus Junior, et al.
Published: (2005-02-01) -
Effective Management System for Solar PV Using Real-Time Data with Hybrid Energy Storage System
by: G. V. Brahmendra Kumar, et al.
Published: (2020-02-01) -
Data analysis of molecular dynamics simulation trajectories of β-sitosterol, sonidegib and cholesterol in smoothened protein with the CHARMM36 force field
by: Mohammad Tasyriq Che Omar
Published: (2020-12-01) -
Tracking Control Method for Greenhouse Environment Prediction Model Based on Real-Time Optimization Error Constraints
by: Lili Ma, et al.
Published: (2023-06-01) -
Macroscopic modeling and control of emission in urban road traffic networks
by: Alfréd Csikós, et al.
Published: (2015-06-01)