共 50 条
- [31] Non-Cryptographic Methods of MAC Spoof Detection in Wireless LAN PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 344 - 349
- [32] Non-Cryptographic Security to Data: Distortion based Anonymization Techniques 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY (ICAET), 2014,
- [34] Enhancing security and randomness in cryptography and non-cryptographic applications with ORNA algorithm ENGINEERING RESEARCH EXPRESS, 2024, 6 (04):
- [35] Anti-disassembly using cryptographic hash functions JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 79 - 85
- [36] Efficient negative databases from cryptographic hash functions INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 423 - +
- [37] Finding state-of-the-art non-cryptographic hashes with genetic programming PARALLEL PROBLEM SOLVING FROM NATURE - PPSN IX, PROCEEDINGS, 2006, 4193 : 818 - 827
- [38] Black-Box Property of Cryptographic Hash Functions FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 181 - 193
- [39] A family of fast syndrome based cryptographic hash functions PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 64 - 83
- [40] Anti-disassembly using Cryptographic Hash Functions Journal in Computer Virology, 2006, 2 (1): : 79 - 85