Author:
Biryukov Alex,Lamberger Mario,Mendel Florian,Nikolić Ivica
Publisher
Springer Berlin Heidelberg
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On Dillon’s property of (n, m)-functions;Cryptography and Communications;2024-08-01
2. New Records in Collision Attacks on SHA-2;Lecture Notes in Computer Science;2024
3. Esha-256: An Enhanced Secure Cryptographic Hash Algorithm for Information Security;2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS);2023-12-11
4. AXIM: A Programmable Simulation Environment for FPGA Kernels with AXI Interfaces;2023 IEEE 7th Information Technology and Mechatronics Engineering Conference (ITOEC);2023-09-15
5. EDIndex: Enabling Fast Data Queries in Edge Storage Systems;Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval;2023-07-18