共 50 条
- [22] Cryptanalysis of the tiger hash function ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 536 - 550
- [24] Cryptanalysis of the GOST hash function ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 162 - +
- [26] Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security Multimedia Tools and Applications, 2019, 78 : 3107 - 3130
- [28] On hash functions using checksums International Journal of Information Security, 2010, 9 : 137 - 151
- [29] Cryptanalysis of T-function-based hash functions - Applications to MySQL password algorithms Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 267 - 285
- [30] Cryptanalysis of the AEAD and hash algorithm DryGASCON CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (03): : 597 - 625