共 50 条
- [31] Hierarchical key establishment protocols based on secure keyed one-way hash functions TWELFTH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN-12), PROCEEDINGS, 1998, : 162 - 167
- [33] How to construct universal one-way hash functions of order r PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 63 - 76
- [37] A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (02): : 197 - 201
- [38] A token-based software license protection framework using one-way hash functions EEE '05: Proceedings of the 2005 International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing, 2005, : 134 - 139
- [39] Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 334 - 345