Author:
Knudsen Lars R.,Mathiassen John Erik,Muller Frédéric,Thomsen Søren S.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Classification of Hash Functions Based on Anti-Attack Ability;2023 International Conference on Networking and Network Applications (NaNA);2023-08
2. A comprehensive review of the security flaws of hashing algorithms;Journal of Computer Virology and Hacking Techniques;2022-10-19
3. Towards Designing Greener Secured Hash Functions;2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom);2014-09
4. Second-Preimage Analysis of Reduced SHA-1;Information Security and Privacy;2010
5. The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition;Topics in Cryptology - CT-RSA 2010;2010