Cryptographic Hash Functions and Attacks – A Detailed Study
Rituparna Kundu
openalex +2 more sources
A new cryptographic key assignment scheme using a one-way hash function [PDF]
Hui‐Feng Huang
openalex +1 more source
Construction of (4,8)-schemes of visual cryptography on the base of a class of linear hash functions [PDF]
N. A. Zorina, Y. V. Kosolapov
openalex +1 more source
On the argument of the absence of properties of a random oracle for some cryptographic hash functions [PDF]
Irina Gribanova, Alexander Semenov
openalex +1 more source
A hybrid hash framework for post quantum secure zero knowledge identification. [PDF]
Bhadane S +3 more
europepmc +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source
Adaptive Restart and CEGAR-Based Solver for Inverting Cryptographic Hash Functions [PDF]
Saeed Nejati +4 more
openalex +1 more source
Blockchain-based cryptographic framework for secure data transmission in IoT edge environments using ECaps-Net. [PDF]
Mohamed Meerasha I +3 more
europepmc +1 more source
A Family of Fast Syndrome Based Cryptographic Hash Functions
Daniel Augot +2 more
openalex +2 more sources

