Modified Grøstl: An Efficient Hash Function
暂无分享,去创建一个
[1] Vasilios Zorkadis,et al. A novel suite of tests for evaluating one-way hash functions for electronic commerce applications , 2000, Proceedings of the 26th Euromicro Conference. EUROMICRO 2000. Informatics: Inventing the Future.
[2] Helena Handschuh,et al. Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.
[3] Dhananjoy Dey,et al. R-hash : Hash Function Using Random Quadratic Polynomials Over GF(2) , 2011, IACR Cryptol. ePrint Arch..
[4] Florian Mendel,et al. Symmetric Cryptography , 2009 .
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[7] Willi Meier,et al. SHA-3 proposal BLAKE , 2009 .
[8] Shirley M. Radack,et al. Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS) 180-4 | NIST , 2012 .