Verification of Implementations of Cryptographic Hash Functions

Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and correctness of cryptographic implementations, and...

Full description

Bibliographic Details
Main Authors: Dexi Wang, Yu Jiang, Houbing Song, Fei He, Ming Gu, Jiaguang Sun
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/7924403/