Cryptographic Randomness Test of the Modified Hashing Function of SHA256 to Address Length Extension Attack
暂无分享,去创建一个
[1] Bart Preneel,et al. Collisions and other Non-Random Properties for Step-Reduced SHA-256 , 2009, IACR Cryptol. ePrint Arch..
[2] L. Min,et al. Optimized Key Agreement Protocol Based on Chaotic , 2014 .
[3] Maria Rona L. Perez,et al. Modified SHA256 for Securing Online Transactions based on Blockchain Mechanism , 2018, 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM).
[4] Maria Rona Perez,et al. Applying Modified SHA256 on Blockchain using Challenge Response and Off-chain Signatures Patterns , 2019, ICGSP.
[5] Zenggang Xiong,et al. Cryptanalysis of Kim Jiye et al.'s Two-Factor Mutual Authentication with Key Agreement in WSNs , 2016, J. Commun..
[6] Harshvardhan Tiwari,et al. Merkle-Damgård Construction Method and Alternatives: A Review , 2017 .
[7] Lequan Min,et al. Provably Secure Public Key Cryptosystem Based on Chebyshev Polynomials , 2015, J. Commun..
[8] Vinay Chopra,et al. Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman , 2017 .
[9] Chandra Prakash Dewangan,et al. A Novel Approach to Improve Avalanche Effect of AES Algorithm , 2012 .
[10] Dake Liu,et al. High-Throughput Area-Efficient Processor for Cryptography , 2017 .
[11] Zhiwei Sun,et al. Generic Construction of Chameleon Hash to Group Elements , 2016, J. Commun..