2011
DOI: 10.1007/978-3-642-23620-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Visualizing Secure Hash Algorithm (SHA-1) on the Web

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Although SHA plays an important role in cryptography, not many visualization tools include SHA. The web-based applet SHA1-VA [1] was claimed by the authors as the first interactive software to Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored.…”
Section: Introductionmentioning
confidence: 99%
“…Although SHA plays an important role in cryptography, not many visualization tools include SHA. The web-based applet SHA1-VA [1] was claimed by the authors as the first interactive software to Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored.…”
Section: Introductionmentioning
confidence: 99%