Login / Signup
A modified secure hash design to circumvent collision and length extension attacks.
Zeyad A. Al-Odat
Samee U. Khan
Eman Al-qtiemat
Published in:
J. Inf. Secur. Appl. (2022)
Keyphrases
</>
case study
data structure
design process
security mechanisms
secure routing