Cryptographic hash functions play important roles in modern cryptology. Many cryptographic protocols require a secure hash function which holds several security properties classically including a preimage resistance, a second preimage resistance and a collision resistance. Due to the recent attacks on commonly used hash function (e.g.: MD5, SHA-1), NIST announced ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?