共 50 条
- [21] Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 38 - 57
- [22] Provably secure double-block-length hash functions in a black-box model INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 330 - 342
- [23] Security Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (03): : 497 - 508
- [25] Another Glance at Double-Length Hashing CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 176 - 201
- [26] Collision Resistance May Be Unnecessary: Signing Messages With Randomized Hashing PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 241 - 246
- [27] Analysis of double block length hash functions Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2898 : 290 - 302
- [28] Analysis of double block length hash functions CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 290 - 302
- [29] Security of Cyclic Double Block Length Hash Functions CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 153 - 175