Login / Signup
US Secure Hash Algorithms (SHA and HMAC-SHA).
Donald E. Eastlake III
Tony Hansen
Published in:
RFC (2006)
Keyphrases
</>
hash functions
computationally efficient
computational cost
optimization problems
orders of magnitude
times faster
genetic algorithm
data mining
computer vision
data mining techniques
theoretical analysis
computationally expensive
brute force