Filter your results
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.97-111, ⟨10.1007/978-3-319-39028-4_8⟩
Conference papers
hal-01445801v1
|