1. Security services using blockchains: A state of the art survey;Salman;IEEE Commun Surv Tutor,2018
2. Authentication by encrypted negative password;Luo;IEEE Trans Inf Forensics Secur,2018
3. Implementation of randomize-then-combine constructed hash function;Chum,2014
4. Cryptanalysis of the chaotic-map cryptosystem suggested at eurocrypt’91;Biham,1991
5. How to break MD5 and other hash functions;Wang,2005