Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference46 articles.
1. Puniya P (2007) New design criteria for hash functions and block ciphers, Doctoral dissertation, New York University
2. Menezes AJ, Oorschot PCV, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca Raton
3. Wang X, Feng D, Lai X, Yu H (2004) Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, report 2004/199
4. Liang J, Lai XJ (2007) Improved collision attack on hash function MD5. J Comput Sci Technol 22(1):79–87
5. Biham E, Chen R, Joux A, Carribault P, Lemuet C, Jalby W (2005) Collisions of SHA-0 and reduced SHA-1. Lect Notes Comput Sci 3494:36–57
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献