共 50 条
- [41] Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 RESEARCH IN CRYPTOLOGY, 2008, 4945 : 28 - +
- [42] SEU-Resistant SHA-256 Design for Security in Satellites 2008 10TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING FOR SPACE COMMUNICATIONS, 2008, : 77 - 83
- [43] Improving Local Collisions: New Attacks on Reduced SHA-256 ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 262 - 278
- [46] The First Practical Collision for 31-Step SHA-256 ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VII, 2025, 15490 : 237 - 266
- [49] Security audit in cloud-based server by using encrypted data AES-256 and SHA-256 INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
- [50] Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing Personal and Ubiquitous Computing, 2013, 17 : 921 - 932