RFID Security Protocol Based On Cryptographic Hash Function
A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures (Adv. Mater. 23/2024)
Collision Search of a Hash Function by Using Random Mapping (Special Section on Cryptography and Information Security)
The Importance of Cryptographic Hashes in Computer Security. An overview of present and future cryptographic hash functions.