ASIC evaluation of ECHO hash function (2009)

First Author: Lu L
Attributed to:  Next-Generation Data Security Architectures funded by EPSRC

Abstract

No abstract provided

Bibliographic Information

Digital Object Identifier: http://dx.doi.org/10.1109/soccon.2009.5398014

Publication URI: http://dx.doi.org/10.1109/soccon.2009.5398014

Type: Conference/Paper/Proceeding/Abstract

ISBN: 978-1-4244-4940-8