A Survey: Cryptographic Hash Functions for Digital Stamping
暂无分享,去创建一个
[1] Mitsugu Iwamoto,et al. Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful , 2013, IACR Cryptol. ePrint Arch..
[2] Jean-Jacques Quisquater,et al. Cryptographic Hash Functions and Expander Graphs: The End of the Story? , 2015, The New Codebreakers.
[3] S. Muthukrishnan,et al. Perfect Hashing for Strings: Formalization and Algorithms , 1996, CPM.
[4] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[5] Jun Zhou,et al. Bilinear Discriminant Analysis Hashing: A Supervised Hashing Approach for High-Dimensional Data , 2016, ACCV.
[6] Xiuyan Sun. An Improved Symmetric Key Encryption Algorithm for Digital Signature , 2010 .
[7] Sefat Mahjabin,et al. Implementation of DoS and DDoS attacks on cloud servers , 2018, Periodicals of Engineering and Natural Sciences (PEN).
[8] Taekyoung Kwon,et al. Practical Authenticated Key Agreement Using Passwords , 2004, ISC.
[9] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[10] Aiguo Li. Fast Photo Time-Stamp Recognition Based on SGNN , 2006, ISNN.
[12] Mridul Nandi,et al. Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions , 2009, INDOCRYPT.
[13] Jianhua Wang,et al. Summary of Digital Signature , 2012 .
[14] Dong Hoon Lee,et al. Authenticated Public Key Distribution Scheme Without Trusted Third Party , 2005, EUC Workshops.
[15] Noga Alon,et al. Balanced Families of Perfect Hash Functions and Their Applications , 2007, ICALP.
[16] Harald Baier,et al. Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2 , 2012, ICDF2C.
[17] Nicky Mouha,et al. SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security , 2017, IACR Cryptol. ePrint Arch..
[18] John MacCormick,et al. Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers , 2012 .
[19] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[20] Salam Ayad Hussein,et al. Image Encryption Based on Parallel Algorithm via Zigzag Manner with a New Chaotic System , 2019, Journal of Southwest Jiaotong University.
[21] Xian-Sheng Hua,et al. Automatic time stamp extraction system for home videos , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[22] R. Kaur,et al. Digital Signature , 2012, 2012 International Conference on Computing Sciences.
[23] Ran Canetti,et al. Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information , 1997, CRYPTO.
[24] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[25] Qi Tian,et al. Deep hashing with top similarity preserving for image retrieval , 2017, Multimedia Tools and Applications.
[26] Aiguo Li,et al. Photo Time-Stamp Recognition Based on Particle Swarm Optimization , 2004, IEEE/WIC/ACM International Conference on Web Intelligence (WI'04).
[27] George Varghese,et al. Hash-Based Techniques for High-Speed Packet Processing , 2010, Algorithms for Next Generation Networks.
[28] Kazuki Yoneyama,et al. Compact Public Key Encryption with Minimum Ideal Property of Hash Functions , 2014, ProvSec.
[29] Christoph Ruland,et al. Perceptual Image Hashing Technique for Image Authentication in WMSNs , 2015 .
[30] Yueting Zhuang,et al. The heterogeneous feature selection with structural sparsity for multimedia annotation and hashing: a survey , 2012, International Journal of Multimedia Information Retrieval.
[31] Bart Preneel,et al. Seven-Property-Preserving Iterated Hashing: ROX , 2007, ASIACRYPT.
[32] Chun-Shien Lu,et al. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.
[33] Mahmoud Jannesari Ladani,et al. Using Asynchronous Hot Standby Spare in Time-Stamped, Fault-Tolerant, Real-Time System , 2014 .
[34] Prakash Ramesh Gadekar,et al. Lightweight novel trust based framework for IoT enabled wireless network communications , 2019 .
[35] Jian Cheng,et al. Semi-supervised Generative Adversarial Hashing for Image Retrieval , 2018, ECCV.
[36] Manal Abdullah,et al. Asthma attack prediction based on weather factors , 2019, Periodicals of Engineering and Natural Sciences (PEN).
[37] Shumeet Baluja,et al. Learning to hash: forgiving hash functions and applications , 2008, Data Mining and Knowledge Discovery.
[38] Michal Rjasko. Black-Box Property of Cryptographic Hash Functions , 2011, FPS.
[39] Moti Yung,et al. Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding , 2006, ASIACRYPT.
[41] Hefei Ling,et al. Local and global structure preserving hashing for fast digital fingerprint tracing , 2014, Multimedia Tools and Applications.
[42] Ghassan N. Mohammed,et al. Combined DWT-DISB based image watermarking optimized for decision making problems , 2019, Periodicals of Engineering and Natural Sciences (PEN).