共 50 条
- [21] Key-recovery attacks on universal hash function based MAC algorithms ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 144 - +
- [22] Research on a provable security RFID authentication protocol based on Hash function Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):
- [25] Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2167 - 2170
- [26] On the security of mesh-based media hash-dependent watermarking against protocol attacks 2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 169 - 172
- [27] Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128 FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 226 - 243
- [29] A novel secure and efficient hash function with extra padding against rainbow table attacks CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 1161 - 1173
- [30] Improved preimage and pseudo-collision attacks on SM3 hash function Tongxin Xuebao/Journal on Communications, 2018, 39 (01): : 46 - 55