共 50 条
- [31] Security of the Poseidon Hash Function Against Non-Binary Differential and Linear Attacks Cybernetics and Systems Analysis, 2021, 57 : 268 - 278
- [33] Quantum Authentication Protocol for Classical Messages Based on Bell states and Hash Function INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 285 - 291
- [34] Research of RFID certification security protocol based on hash function and DES algorithm 1600, Academy Publisher (08):
- [36] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code Wireless Personal Communications, 2014, 79 : 2595 - 2609
- [38] Preimage and pseudo collision attacks on round-reduced DHA-256 hash function Tongxin Xuebao/Journal on Communications, 2013, 34 (06): : 8 - 15
- [39] Erratum to: A novel secure and efficient hash function with extra padding against rainbow table attacks Cluster Computing, 2018, 21 : 1187 - 1187