共 50 条
- [1] Hash function vulnerability index and hash chain attacks 2007 3RD IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2007, : 1 - 6
- [2] Rebound Attacks on the Reduced Grostl Hash Function TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 350 - +
- [4] Collision and second preimage attacks on the HTBC hash function Ma, Bingke, 1600, Science Press (51):
- [5] Hash function balance and its impact on birthday attacks ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 401 - 418
- [6] Boomerang Attacks on Hash Function Using Auxiliary Differentials TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 215 - +
- [7] A Security RFID Authentication Protocol Based on Hash Function IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
- [9] BLACK-BOX COLLISION ATTACKS ON THE COMPRESSION FUNCTION OF THE GOST HASH FUNCTION SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 325 - 332
- [10] Enhance Neighbor Discovery Protocol Security by Using Secure Hash Algorithm 4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 777 - 784