共 50 条
- [32] A systems theoretic approach to the design of scalable cryptographic hash functions COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 10 - 17
- [34] An update on the side channel cryptanalysis of MACs based on cryptographic hash functions PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 393 - +
- [35] Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 844 - 876
- [36] Constructing cryptographic hash functions from fixed-key blockciphers ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 433 - +
- [38] Cryptographic hash functions and low-power techniques for embedded hardware ISIE 2005: PROCEEDINGS OF THE IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS 2005, VOLS 1- 4, 2005, : 1789 - 1794
- [39] VLSI Implementations of the Cryptographic Hash Functions MD6 and irRUPT ISCAS: 2009 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-5, 2009, : 2914 - +
- [40] Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA 2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 347 - 354