Performance and Security Tradeoffs in Cryptographic Hash Functions
暂无分享,去创建一个
[1] Sandhya Verma,et al. Robustness and security enhancement of SHA with modified message digest and larger bit difference , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).
[2] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[3] Sandeep Kumar Yadav,et al. A Comparative Study of Secure Hash Algorithms , 2016 .
[4] G. Geetha,et al. Cryptographic Hash Functions: A Review , 2012 .
[5] R. Karthika,et al. Design & Characterization of SHA 3- 256 Bit IP Core☆ , 2016 .
[6] Sultan Almuhammadi,et al. Double-Hashing Operation Mode for Encryption , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[7] Javier Galbally,et al. A New Multimodal Approach for Password Strength Estimation—Part I: Theory and Algorithms , 2017, IEEE Transactions on Information Forensics and Security.
[8] Bao Li,et al. Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function , 2014, ACNS.
[9] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.