Hardware Implementation of Hash Functions [chapter]

Zhijie Shi, Chujiao Ma, Jordan Cote, Bing Wang
2011 Introduction to Hardware Security and Trust  
doi:10.1007/978-1-4419-8080-9_2 fatcat:cgxyrhty2jcrbaaknstb5b4vh4