Login / Signup
Verification of a Cryptographic Primitive: SHA-256.
Andrew W. Appel
Published in:
ACM Trans. Program. Lang. Syst. (2015)
Keyphrases
</>
hash functions
cryptographic protocols
model checking
smart card
high assurance
higher level
database
similarity search
information retrieval
genetic algorithm
digital signature
asynchronous circuits
false acceptance
galois field