A Survey: Cryptographic Hash Functions for Digital Stamping

[1]  Mitsugu Iwamoto,et al.  Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful , 2013, IACR Cryptol. ePrint Arch..

[2]  Jean-Jacques Quisquater,et al.  Cryptographic Hash Functions and Expander Graphs: The End of the Story? , 2015, The New Codebreakers.

[3]  S. Muthukrishnan,et al.  Perfect Hashing for Strings: Formalization and Algorithms , 1996, CPM.

[4]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[5]  Jun Zhou,et al.  Bilinear Discriminant Analysis Hashing: A Supervised Hashing Approach for High-Dimensional Data , 2016, ACCV.

[6]  Xiuyan Sun An Improved Symmetric Key Encryption Algorithm for Digital Signature , 2010 .

[7]  Sefat Mahjabin,et al.  Implementation of DoS and DDoS attacks on cloud servers , 2018, Periodicals of Engineering and Natural Sciences (PEN).

[8]  Taekyoung Kwon,et al.  Practical Authenticated Key Agreement Using Passwords , 2004, ISC.

[9]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[10]  Aiguo Li Fast Photo Time-Stamp Recognition Based on SGNN , 2006, ISNN.

[12]  Mridul Nandi,et al.  Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions , 2009, INDOCRYPT.

[13]  Jianhua Wang,et al.  Summary of Digital Signature , 2012 .

[14]  Dong Hoon Lee,et al.  Authenticated Public Key Distribution Scheme Without Trusted Third Party , 2005, EUC Workshops.

[15]  Noga Alon,et al.  Balanced Families of Perfect Hash Functions and Their Applications , 2007, ICALP.

[16]  Harald Baier,et al.  Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2 , 2012, ICDF2C.

[17]  Nicky Mouha,et al.  SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security , 2017, IACR Cryptol. ePrint Arch..

[18]  John MacCormick,et al.  Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers , 2012 .

[19]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[20]  Salam Ayad Hussein,et al.  Image Encryption Based on Parallel Algorithm via Zigzag Manner with a New Chaotic System , 2019, Journal of Southwest Jiaotong University.

[21]  Xian-Sheng Hua,et al.  Automatic time stamp extraction system for home videos , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[22]  R. Kaur,et al.  Digital Signature , 2012, 2012 International Conference on Computing Sciences.

[23]  Ran Canetti,et al.  Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information , 1997, CRYPTO.

[24]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[25]  Qi Tian,et al.  Deep hashing with top similarity preserving for image retrieval , 2017, Multimedia Tools and Applications.

[26]  Aiguo Li,et al.  Photo Time-Stamp Recognition Based on Particle Swarm Optimization , 2004, IEEE/WIC/ACM International Conference on Web Intelligence (WI'04).

[27]  George Varghese,et al.  Hash-Based Techniques for High-Speed Packet Processing , 2010, Algorithms for Next Generation Networks.

[28]  Kazuki Yoneyama,et al.  Compact Public Key Encryption with Minimum Ideal Property of Hash Functions , 2014, ProvSec.

[29]  Christoph Ruland,et al.  Perceptual Image Hashing Technique for Image Authentication in WMSNs , 2015 .

[30]  Yueting Zhuang,et al.  The heterogeneous feature selection with structural sparsity for multimedia annotation and hashing: a survey , 2012, International Journal of Multimedia Information Retrieval.

[31]  Bart Preneel,et al.  Seven-Property-Preserving Iterated Hashing: ROX , 2007, ASIACRYPT.

[32]  Chun-Shien Lu,et al.  Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.

[33]  Mahmoud Jannesari Ladani,et al.  Using Asynchronous Hot Standby Spare in Time-Stamped, Fault-Tolerant, Real-Time System , 2014 .

[34]  Prakash Ramesh Gadekar,et al.  Lightweight novel trust based framework for IoT enabled wireless network communications , 2019 .

[35]  Jian Cheng,et al.  Semi-supervised Generative Adversarial Hashing for Image Retrieval , 2018, ECCV.

[36]  Manal Abdullah,et al.  Asthma attack prediction based on weather factors , 2019, Periodicals of Engineering and Natural Sciences (PEN).

[37]  Shumeet Baluja,et al.  Learning to hash: forgiving hash functions and applications , 2008, Data Mining and Knowledge Discovery.

[38]  Michal Rjasko Black-Box Property of Cryptographic Hash Functions , 2011, FPS.

[39]  Moti Yung,et al.  Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding , 2006, ASIACRYPT.

[41]  Hefei Ling,et al.  Local and global structure preserving hashing for fast digital fingerprint tracing , 2014, Multimedia Tools and Applications.

[42]  Ghassan N. Mohammed,et al.  Combined DWT-DISB based image watermarking optimized for decision making problems , 2019, Periodicals of Engineering and Natural Sciences (PEN).