共 50 条
- [2] Towards secure and fast hash functions [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01): : 55 - 62
- [3] TWISTER - A Framework for Secure and Fast Hash Functions [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 257 - +
- [4] A reconfigurable implementation of the new secure hash algorithm [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 281 - +
- [5] Secure Hash Algorithm SHA-3 [J]. Datenschutz und Datensicherheit - DuD, 2013, 37 (2) : 104 - 104
- [6] Summarizing data for secure transaction: A hash algorithm [J]. AFRICAN JOURNAL OF BUSINESS MANAGEMENT, 2011, 5 (34): : 13211 - 13216
- [9] A Secure Perceptual Hash Algorithm for Image Content Authentication [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 108 - 121