Login / Signup
A Systematic Flow for Developing Totally Self-Checking Architectures for SHA-1 and SHA-2 Cryptographic Hash Families.
George Athanasiou
George Theodoridis
Costas E. Goutis
Harris E. Michail
Takis Kasparis
Published in:
J. Circuits Syst. Comput. (2013)
Keyphrases
</>
hash functions
hashing algorithm
similarity search
locality sensitive hashing
hash table
databases
secret key
data distribution
nearest neighbor search
information flow
hashing methods
real time
data sets
multi agent
query processing
hamming distance