Funder
Temasek Laboratories, NTU
Reference56 articles.
1. Elaine Barker. 2016. Recommendation for key management part 1: General. NIST special publication (2016). Elaine Barker. 2016. Recommendation for key management part 1: General. NIST special publication (2016).
2. Sam Biddle. 2017. NYU ACCIDENTALLY EXPOSED MILITARY CODE-BREAKING COMPUTER PROJECT TO ENTIRE INTERNET. URL https://theintercept.com/2017/05/11/nyu-accidentally-exposed-military-code-braking-computer-project-to-entire-internet/ (2017). Sam Biddle. 2017. NYU ACCIDENTALLY EXPOSED MILITARY CODE-BREAKING COMPUTER PROJECT TO ENTIRE INTERNET. URL https://theintercept.com/2017/05/11/nyu-accidentally-exposed-military-code-braking-computer-project-to-entire-internet/ (2017).
3. Near-Collisions of SHA-0
4. Cryptanalysis of SHA-0 and Reduced SHA-1
5. Collisions of SHA-0 and Reduced SHA-1
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献