Publisher
Springer International Publishing
Reference33 articles.
1. J. Kelsey, SHA3, Past, Present, and Future (CHES, 2013)
2. M.J. Dworkin, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. Federal Inf. Process, STDS, (NIST FIPS) – 202, (2015)
3. Menezes, van Oorschot, Vanstone, Handbook of Applied Cryptography, Chapter 9, (2001)
4. J. Katz, Y. Lindell, Introduction to Modern Cryptography (Chapman and Hall/CRC Press, 2007), p. 134, (construction 4.13),
5. M. Nandi, S. Paul, Speeding up the widepipe: secure and fast hashing, in Indocrypt 2010, ed. by G. Gong, K. Gupta, (Springer, 2010)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design and Analysis of Deep Learning based Water Potability Prediction;2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS);2023-10-18
2. Advanced Power Management for Electric Vehicle Charging Station;2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS);2023-10-18
3. Smart Auto Image Captioning Using LSTM and Densenet Network;2023 6th International Conference on Contemporary Computing and Informatics (IC3I);2023-09-14
4. Deep Learning based Smart American Sign Language Detection in Alphabets;2023 6th International Conference on Contemporary Computing and Informatics (IC3I);2023-09-14
5. Designing and validating an MD5 Hash Algorithm using the UVM Verification Framework and Checkers;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06