Cryptographic Hash Functions and Some Applications to Information Security
Crossref DOI link: https://doi.org/10.1007/978-3-319-68032-3_6
Published Online: 2018-01-14
Published Print: 2017
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Bromberg, Lisa
License valid from 2017-01-01