Author:
Yang Yijun,Tian Xi,Pei Pei,He Xianhong,Zhang Xiayan
Funder
Shenzhen Polytechnic Youth Innovation Project
National Natural Science Foundation of China
Guangdong Natural Science Foundation
Guangdong Rural Science and Technology Commissioner Project
Shenzhen Science and Technology Program
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference57 articles.
1. Abdelfatah R, Baka E (2021) Keyed parallel hash algorithm based on multiple chaotic maps (KPHA-MCM). IEEE Access 9:130399–130409
2. Baek J, Vu QH, Liu JK, Huang X, Xiang Y (2015) A secure cloud computing based framework for big data information management of smart grid. IEEE Trans Cloud Comput 3(2):233–244
3. Bertoni G, Daeman J, Peeters M (2007) Sponge functions. In: ECRYPT hash workshop. https://www.researchgate.net/profile/Gm-Bertoni/publication/242285874_Sponge_Functions/links/53db850d0cf2a76fb6679fd5/Sponge-Functions.pdf
4. Biham E, Dunkelman O (2007) A framework for iterative hash functions—HAIFA. In: Cryptology, Report 2007/278
5. Boer B, Bosselaers A (1994) Collisions for the compression function of MD5. In: Eurocrypt 1993, LNCS, vol 765, pp 293–304
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献