<--- Back to Details
First PageDocument Content
Cryptographic hash functions / SHA-2 / SHA-1 / Radio-frequency identification / Crypt / Hash function / Secure Hash Algorithm / VEST / SHA-3
Date: 2008-07-21 05:29:13
Cryptographic hash functions
SHA-2
SHA-1
Radio-frequency identification
Crypt
Hash function
Secure Hash Algorithm
VEST
SHA-3

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Download Document from Source Website

File Size: 188,75 KB

Share Document on Facebook

Similar Documents