共 50 条
- [41] Security Properties of Domain Extenders for Cryptographic Hash Functions JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2010, 6 (04): : 453 - 480
- [43] A high-throughput processor for cryptographic hash functions Journal of Communications, 2016, 11 (07): : 702 - 709
- [44] On cryptographic propagation criteria for Boolean functions 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 148 - 149
- [47] Inverting Cryptographic Hash Functions via Cube-and-Conquer Journal of Artificial Intelligence Research, 2024, 81 : 359 - 399
- [48] High speed calculation of cryptographic hash functions by CNN chips CNNA 98 - 1998 FIFTH IEEE INTERNATIONAL WORKSHOP ON CELLULAR NEURAL NETWORKS AND THEIR APPLICATIONS - PROCEEDINGS, 1998, : 186 - 191
- [50] Practical Attacks on AES-like Cryptographic Hash Functions PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 259 - 271