共 50 条
- [1] An Improvement of Linearization-Based Algebraic Attacks SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 157 - 167
- [2] Quantum Linearization Attacks ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 422 - 452
- [3] Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 216 - 225
- [4] Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 217 - 230
- [6] HoneyHash: Honeyword Generation Based on Transformed Hashes SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 161 - 173
- [7] Image Matching Algorithm Based on Hashes Extraction PROGRESS IN ARTIFICIAL INTELLIGENCE (EPIA 2017), 2017, 10423 : 87 - 94
- [9] Chameleon Hashes Without Key Exposure Based on Factoring Journal of Computer Science and Technology, 2007, 22 : 109 - 113
- [10] ATTACKS AGAINST JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1954, 156 (10): : 1009 - 1009