Publisher
Springer Berlin Heidelberg
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A comprehensive review of the security flaws of hashing algorithms;Journal of Computer Virology and Hacking Techniques;2022-10-19
2. Security Analysis of a Design Variant of Randomized Hashing;Applications and Techniques in Information Security;2017
3. Building indifferentiable compression functions from the PGV compression functions;Designs, Codes and Cryptography;2014-11-09
4. Time-Memory Trade-Offs for Near-Collisions;Fast Software Encryption;2014
5. Preimage Attack on 23-Step Tiger;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2011