First Page | Document Content | |
---|---|---|
![]() Date: 2010-01-10 04:31:20SHA-2 NIST hash function competition Crypt Hash function Skein Hash list Computer programming Artificial intelligence Key stretching Cryptographic hash functions Field-programmable gate array Computing | Source URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 459,44 KBShare Document on Facebook |