"System Analysis and Example of Using SHA-512 Hash Functions to Protect ..."

Vasyl Sheketa et al. (2021)

Details and statistics

DOI: 10.1109/CSIT52700.2021.9648699

access: closed

type: Conference or Workshop Paper

metadata version: 2022-02-08

a service of  Schloss Dagstuhl - Leibniz Center for Informatics