Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Lecture Notes in Computer Science;E. Brickell,2000
2. Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. In: Proc. 30th Annual ACM Symposium on Theory of Computing (STOC), pp. 209–218 (1998)
3. Lecture Notes in Computer Science;I. Damgård,1990
4. Lecture Notes in Computer Science;H. Dobbertin,1996
5. Lecture Notes in Computer Science;M. Girault,1994
Cited by
186 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Second Preimage Attack on the XOR Hash Combiner;IET Information Security;2024-03-22
2. Collision Resistance from Multi-collision Resistance;Journal of Cryptology;2024-03-06
3. H2B: Crypto Hash Functions Based on Hybrid Ring Generators;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2024-02
4. Collision Attack;Encyclopedia of Cryptography, Security and Privacy;2024
5. Improving Generic Attacks Using Exceptional Functions;Lecture Notes in Computer Science;2024