↓ Skip to main content

Open Problems in Network Security

Overview of attention for book
Attention for Chapter 8: Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3
Altmetric Badge

Citations

dimensions_citation
7 Dimensions

Readers on

mendeley
19 Mendeley