First Page | Document Content | |
---|---|---|
Date: 2008-07-21 05:29:13Cryptographic hash functions SHA-2 SHA-1 Radio-frequency identification Crypt Hash function Secure Hash Algorithm VEST SHA-3 | Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern IrelandAdd to Reading ListSource URL: events.iaik.tugraz.atDownload Document from Source WebsiteFile Size: 188,75 KBShare Document on Facebook |