共 50 条
- [22] Cryptanalysis of the GOST hash function ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 162 - +
- [24] Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security Multimedia Tools and Applications, 2019, 78 : 3107 - 3130
- [25] Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 471 - 477
- [26] Cryptanalysis of T-function-based hash functions - Applications to MySQL password algorithms Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 267 - 285
- [27] Cryptanalysis of the AEAD and hash algorithm DryGASCON CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (03): : 597 - 625
- [29] Cryptanalysis of the AEAD and hash algorithm DryGASCON Cryptography and Communications, 2022, 14 : 597 - 625
- [30] Cryptanalysis of the alleged SecurID hash function SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 130 - 144