Login / Signup
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA.
Zeyad A. Al-Odat
Assad Abbas
Samee U. Khan
Published in:
FIT (2019)
Keyphrases
</>
hash functions
learning algorithm
data structure
computational complexity
optimization problems
recently developed
computational cost
theoretical analysis
computational efficiency
computationally expensive
hash table
data sets
similarity measure
lightweight
times faster