Sign in

A modified secure hash design to circumvent collision and length extension attacks.

Zeyad A. Al-OdatSamee U. KhanEman Al-qtiemat
Published in: J. Inf. Secur. Appl. (2022)
Keyphrases
  • case study
  • data structure
  • design process
  • security mechanisms
  • secure routing