↓ Skip to main content

Introduction to Hardware Security and Trust

Overview of attention for book
Attention for Chapter 2: Hardware Implementation of Hash Functions
Altmetric Badge

Citations

dimensions_citation
175 Dimensions

Readers on

mendeley
16 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Hardware Implementation of Hash Functions
Chapter number 2
Book title
Introduction to Hardware Security and Trust
Published by
Springer, New York, NY, January 2012
DOI 10.1007/978-1-4419-8080-9_2
Book ISBNs
978-1-4419-8079-3, 978-1-4419-8080-9
Authors

Zhijie Shi, Chujiao Ma, Jordan Cote, Bing Wang

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 16 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 16 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 5 31%
Researcher 3 19%
Student > Ph. D. Student 3 19%
Student > Bachelor 1 6%
Other 1 6%
Other 1 6%
Unknown 2 13%
Readers by discipline Count As %
Computer Science 8 50%
Engineering 5 31%
Business, Management and Accounting 1 6%
Unknown 2 13%