共 50 条
- [41] A Lightweight NFC Authentication Algorithm Based on Modified Hash Function International Journal of Network Security, 2022, 24 (03): : 436 - 443
- [42] Key storage management scheme based on keyed hash tree with state 2018, Editorial Board of Journal on Communications (39): : 94 - 102
- [43] Data integrity algorithm based on additive generators and hash function Journal of Computer Virology and Hacking Techniques, 2022, 18 : 31 - 41
- [44] Research of New Index Generation Algorithm Based on Hash Function PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 799 - 802
- [45] Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function ICECS 2004: 11TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, 2004, : 567 - 570
- [48] A Chaos-Based Keyed Hash Function for Secure Protocol and Messege Authentication in Mobile Ad Hoc Wireless Networks 2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1357 - 1364
- [49] Enhanced Secure Hash Algorithm-512 based on Quadratic Function 2018 IEEE 10TH INTERNATIONAL CONFERENCE ON HUMANOID, NANOTECHNOLOGY, INFORMATION TECHNOLOGY, COMMUNICATION AND CONTROL, ENVIRONMENT AND MANAGEMENT (HNICEM), 2018,