1.
Brukštus T. Analysis and implementation of cryptographic hash functions in programmable logic devices. MLA [Internet]. 2016Jun.29 [cited 2024Jul.8];8(3):321-6. Available from: https://jeelm.vgtu.lt/index.php/MLA/article/view/2451