共 13 条
- [1] Automated design of cryptographic hash schemes by evolving highly-nonlinear functions [J]. J. Inf. Sci. Eng., 2008, 5 (1485-1504):
- [3] A systems theoretic approach to the design of scalable cryptographic hash functions [J]. COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 10 - 17
- [5] Authentication Schemes from Highly Nonlinear Functions [J]. Designs, Codes and Cryptography, 2006, 40 : 71 - 79
- [7] Authentication schemes from highly nonlinear functions [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 739 - +
- [10] Evaluation and Design of Non-cryptographic Hash Functions for Network Data Stream Algorithms [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 239 - 244