Publisher
Springer Nature Switzerland
Reference29 articles.
1. Balasubramanian, K. (2018). Hash functions and their applications. Algorithmic strategies for solving complex problems in cryptography, (pp. 66–77). IGI Global.
2. Burhan, M., Rehman, R. A., Kim, B.-S., & Khan, B. (2018). IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors,18. https://doi.org/10.3390/s18092796
3. Canniere, C. D., & Preneel, B. (2006). TRIVIUM A stream cipher construction inspired by block cipher design principles, Workshop on Stream Ciphers Revisited (SASC2006).
4. Chown, P. (2002). Advanced encryption standard (AES) ciphersuites for transport layer security (TLS). Tech. rep. RFC 3268.
5. Eastlake, D., & Jones, P. (2001). US secure hash algorithm 1 (SHA1).