You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Mendeley readers
Chapter title |
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512
|
---|---|
Chapter number | 6 |
Book title |
Information Security
|
Published by |
Springer, Berlin, Heidelberg, September 2002
|
DOI | 10.1007/3-540-45811-5_6 |
Book ISBNs |
978-3-54-044270-7, 978-3-54-045811-1
|
Authors |
Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott |
Mendeley readers
The data shown below were compiled from readership statistics for 43 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
United Kingdom | 1 | 2% |
United States | 1 | 2% |
Germany | 1 | 2% |
Unknown | 40 | 93% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 12 | 28% |
Student > Master | 11 | 26% |
Student > Bachelor | 5 | 12% |
Researcher | 3 | 7% |
Professor | 2 | 5% |
Other | 4 | 9% |
Unknown | 6 | 14% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 27 | 63% |
Engineering | 6 | 14% |
Business, Management and Accounting | 1 | 2% |
Physics and Astronomy | 1 | 2% |
Mathematics | 1 | 2% |
Other | 0 | 0% |
Unknown | 7 | 16% |