Hani, M. K., Sha'ameri, A. Z., & Chong, W. S. (2000). Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security.
Chicago Style (17th ed.) CitationHani, Mohamed Khalil, Ahmad Zuri Sha'ameri, and Wei Sheng Chong. Pipeline Implementation of Secure Hash Algorithm (SHA-l) for Cryptographic Application in Network Security. 2000.
MLA (9th ed.) CitationHani, Mohamed Khalil, et al. Pipeline Implementation of Secure Hash Algorithm (SHA-l) for Cryptographic Application in Network Security. 2000.
Warning: These citations may not always be 100% accurate.