Fig. 8From: Nanoscale cryptography: opportunities and challengesSHA-512 Logic [23]Back to article page