by Jeffrey Scott Vitter
No reviews yet. Be the first!
Algorithms and data structures for exter...
Hashing in Computer Science
Secure hash standard
The keyed-hash message authentication co...
A general purpose scatter storage subsys...
VLSI circuits for cryptographic authenti...