Merkliste 
 1 Ergebnisse 
 
1

Two-Stage Pipelining Implementation of the Secure Hash Algo..:

, In: Advances in Information, Communication and Cybersecurity; Lecture Notes in Networks and Systems,
Assad, F. ; Fettach, M. ; Elotmani, F.. - p. 557-567 , 2022