共 50 条
- [21] A chaos-based keyed hash function based on fixed point representation Cluster Computing, 2019, 22 : 649 - 660
- [24] A chaos-based keyed hash function based on fixed point representation CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 649 - 660
- [25] Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function ICECS 2004: 11TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, 2004, : 567 - 570
- [27] Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network Telecommunication Systems, 2013, 52 : 515 - 524
- [30] A Chaos-Based Keyed Hash Function for Secure Protocol and Messege Authentication in Mobile Ad Hoc Wireless Networks 2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1357 - 1364