共 50 条
- [21] Bad Directions in Cryptographic Hash Functions INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 488 - 508
- [22] Cryptographic Hash Functions: Theory and Practice INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 1 - 3
- [25] Some Observations on the Theory of Cryptographic Hash Functions Designs, Codes and Cryptography, 2006, 38 : 259 - 277
- [28] Petra-r cryptographic hash functions SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 253 - 259
- [30] Origami Voting: A Non-cryptographic Approach to Transparent Ballot Verification FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12063 : 273 - 290