共 50 条
- [1] Bad Directions in Cryptographic Hash Functions [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 488 - 508
- [2] Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT) [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2021, 2 (04):
- [4] A systems theoretic approach to the design of scalable cryptographic hash functions [J]. COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 10 - 17
- [6] A Systematic Study of Lightweight Hash Functions on FPGAs [J]. 2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
- [8] Automated design of cryptographic hash schemes by evolving highly-nonlinear functions [J]. J. Inf. Sci. Eng., 2008, 5 (1485-1504):
- [9] Comparison Study of Lightweight Hash Functions for an Authentication Solution on IoT [J]. ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT (AI2SD'2020), VOL 2, 2022, 1418 : 1189 - 1193