共 50 条
- [21] A high-throughput processor for cryptographic hash functions Journal of Communications, 2016, 11 (07): : 702 - 709
- [22] Edon-R(256, 384, 512) - an efficient implementation of Edon-R, family of cryptographic hash functions COMMENTATIONES MATHEMATICAE UNIVERSITATIS CAROLINAE, 2008, 49 (02): : 219 - 239
- [24] Performance of the most common non-cryptographic hash functions SOFTWARE-PRACTICE & EXPERIENCE, 2014, 44 (06): : 681 - 698
- [25] Inverting Cryptographic Hash Functions via Cube-and-Conquer Journal of Artificial Intelligence Research, 2024, 81 : 359 - 399
- [26] High speed calculation of cryptographic hash functions by CNN chips CNNA 98 - 1998 FIFTH IEEE INTERNATIONAL WORKSHOP ON CELLULAR NEURAL NETWORKS AND THEIR APPLICATIONS - PROCEEDINGS, 1998, : 186 - 191
- [28] Practical Attacks on AES-like Cryptographic Hash Functions PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 259 - 271
- [29] Questioning the Criteria for Evaluating Non-cryptographic Hash Functions Queue, 2024, 22 (04): : 54 - 72
- [30] . Instruction Set Extensions for Cryptographic Hash Functions on a Microcontroller Architecture 2012 IEEE 23RD INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP), 2012, : 117 - 124