STITCH-256: A dedicated cryptographic hash function
暂无分享,去创建一个
[1] Ramin Ayanzadeh,et al. Fuzzy Cellular Automata Based Random Numbers Generation , 2012 .
[2] Ramin Ayanzadeh,et al. Two-layer Cellular Automata Based Cryptography , 2012 .
[3] Antoon Bosselaers,et al. An Attack on the Last Two Rounds of MD4 , 1991, CRYPTO.
[4] Xiaoyun Wang,et al. Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.
[5] Charanjit S. Jutla,et al. Provably Good Codes for Hash Function Design , 2009, IEEE Transactions on Information Theory.
[6] Ramin Ayanzadeh,et al. Innovative Approach to Generate Uniform Random Numbers Based on a Novel Cellular Automata , 2009 .