Improvement in SHA-3 Algorithm Using Different Internal Methods and Operations
暂无分享,去创建一个
[1] Marc Stevens,et al. The First Collision for Full SHA-1 , 2017, CRYPTO.
[2] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[3] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[4] Guido Bertoni,et al. Keccak sponge function family main document , 2009 .
[5] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[6] Andrey Bogdanov,et al. On security arguments of the second round SHA-3 candidates , 2012, International Journal of Information Security.
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Bart Preneel. Cryptographic Hash Functions: Theory and Practice , 2010, INDOCRYPT.
[9] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.