XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Magazine: Hello world
Creating hash functions using intrinsic functions

Creating hash functions using intrinsic functions

By ,

Full text also available in the ACM Digital Library as PDF | HTML | Digital Edition

Tags: Hash functions and message authentication codes

Thank you for your interest in this article. This content is protected. You may log in with your ACM account or subscribe to access the full text.