-
1
Trojan message attack on the concatenated hash functions
Published 2016-08-01Subjects: “…hash functions…”
Get full text
Article -
2
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
3
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01Subjects: Get full text
Article -
4
One-way hash function with chaotic dynamic parameters
Published 2008-01-01Subjects: “…hash function…”
Get full text
Article -
5
New indifferentiability security proof of MDPH hash function
Published 2022-07-01Subjects: Get full text
Article -
6
Extended integer tent maps and dynamic hash function
Published 2010-01-01Subjects: “…hash function…”
Get full text
Article -
7
A secure authentication method based on hash function for RFID system
Published 2017-06-01Subjects: Get full text
Article -
8
Cryptanalysis of some chaos-based keyed hash functions
Published 2011-01-01Subjects: Get full text
Article -
9
-
10
Design keyed Hash function based on couple chaotic system
Published 2006-01-01Subjects: Get full text
Article -
11
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01Subjects: Get full text
Article -
12
Duplicate elimination algorithm for data streams with SKIP Bloom filter
Published 2012-02-01Subjects: Get full text
Article -
13
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01Subjects: Get full text
Article -
14
Research on a real-time receiving scheme of streaming data
Published 2022-04-01Subjects: Get full text
Article -
15
-
16
Blockchain-based result-traceable searchable encryption scheme
Published 2019-09-01Subjects: Get full text
Article -
17
Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
Published 2007-01-01Subjects: “…Hash function…”
Get full text
Article -
18
Chaos-based encryption and message authentication algorithm for wireless sensor network
Published 2013-05-01Subjects: Get full text
Article -
19
-
20
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01Subjects: Get full text
Article