共 50 条
- [1] Cryptographic hash functions European transactions on telecommunications and related technologies, 1994, 5 (04): : 431 - 448
- [2] CRYPTOGRAPHIC HASH FUNCTIONS EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1994, 5 (04): : 431 - 448
- [3] The state of cryptographic hash functions LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 158 - 182
- [4] Verification of Implementations of Cryptographic Hash Functions IEEE ACCESS, 2017, 5 : 7816 - 7825
- [5] Cryptographic Hash Functions: Theory and Practice PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 115 - 117
- [6] Bad Directions in Cryptographic Hash Functions INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 488 - 508
- [7] Cryptographic Hash Functions: Theory and Practice INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 1 - 3
- [10] Some Observations on the Theory of Cryptographic Hash Functions Designs, Codes and Cryptography, 2006, 38 : 259 - 277