共 50 条
- [1] Constructions and Attacks on Hash Functions 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 139 - 144
- [2] New constructions of universal hash functions based on function sums COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 416 - 425
- [3] RC4-Hash: A new hash function based on RC4 - (Extended abstract) PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 80 - +
- [4] Towards secure and fast hash functions IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01): : 55 - 62
- [5] New constructions and practical applications for private stream searching - (Extended abstract) 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 132 - +
- [6] Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 949 - 954
- [8] Equational systems and free constructions - (EXTENDED ABSTRACT) AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2007, 4596 : 607 - +
- [9] Constructions of sparse asymmetric connectors extended abstract FST TCS 2003: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, 2003, 2914 : 13 - 22
- [10] Provably secure steganography - (Extended abstract) ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 77 - 92