Finding Bugs in Cryptographic Hash Function Implementations | IEEE Journals & Magazine | IEEE Xplore