-
1
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01Subjects: Get full text
Article -
2
One-way hash function with chaotic dynamic parameters
Published 2008-01-01Subjects: “…hash function…”
Get full text
Article -
3
New indifferentiability security proof of MDPH hash function
Published 2022-07-01Subjects: Get full text
Article -
4
Extended integer tent maps and dynamic hash function
Published 2010-01-01Subjects: “…hash function…”
Get full text
Article -
5
A secure authentication method based on hash function for RFID system
Published 2017-06-01Subjects: Get full text
Article -
6
Cryptanalysis of some chaos-based keyed hash functions
Published 2011-01-01Subjects: Get full text
Article -
7
-
8
Design keyed Hash function based on couple chaotic system
Published 2006-01-01Subjects: Get full text
Article -
9
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01Subjects: Get full text
Article -
10
Duplicate elimination algorithm for data streams with SKIP Bloom filter
Published 2012-02-01Subjects: Get full text
Article -
11
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01Subjects: Get full text
Article -
12
Research on a real-time receiving scheme of streaming data
Published 2022-04-01Subjects: Get full text
Article -
13
-
14
Blockchain-based result-traceable searchable encryption scheme
Published 2019-09-01Subjects: Get full text
Article -
15
Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
Published 2007-01-01Subjects: “…Hash function…”
Get full text
Article -
16
Chaos-based encryption and message authentication algorithm for wireless sensor network
Published 2013-05-01Subjects: Get full text
Article -
17
-
18
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01Subjects: Get full text
Article -
19
New hash function based on C-MD structure and chaotic neural network
Published 2023-06-01Subjects: “…hash function…”
Get full text
Article -
20
Related-key rectangle attack on the full ARIRANG encryption mode
Published 2011-01-01Subjects: Get full text
Article