Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware | IEEE Journals & Magazine | IEEE Xplore