-
21
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
Published 2014-02-01Subjects: “…hash function…”
Get full text
Article -
22
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
Published 2013-06-01Subjects: “…DHA-256 hash function…”
Get full text
Article -
23
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article -
24
HashTrie:a space-efficient multiple string matching algorithm
Published 2015-10-01Subjects: Get full text
Article -
25
Secure network coding scheme for scalable video streaming
Published 2013-05-01Subjects: Get full text
Article -
26
Private-preserving scientific computation of the rational numbers
Published 2022-06-01Subjects: Get full text
Article -
27
Improved preimage and pseudo-collision attacks on SM3 hash function
Published 2018-01-01Subjects: “…SM3 hash function…”
Get full text
Article -
28
A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)
Published 2024-01-01Subjects: Get full text
Article -
29
One-way hash function construction based on Chen-type hyper-chaotic system and key-stream
Published 2009-01-01Subjects: “…one-way hash function…”
Get full text
Article -
30
Provably secure quantum resistance two-server password-authenticated key exchange protocol
Published 2022-03-01Subjects: Get full text
Article -
31
Terminal power control method of power line carrier communication network based on adaptive hash function
Published 2023-10-01Subjects: “…adaptive hash function…”
Get full text
Article -
32
Trojan message attack on the concatenated hash functions
Published 2016-08-01Subjects: “…hash functions…”
Get full text
Article -
33
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article