The following pages link to Selected Areas in Cryptography (Q5713956):
Displaying 11 items.
- A structure-based chaotic hashing scheme (Q327795) (← links)
- A combinatorial analysis of recent attacks on step reduced SHA-2 family (Q1032494) (← links)
- Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy (Q1640423) (← links)
- Analysing the HPKE standard (Q2056674) (← links)
- Attacking Reduced Round SHA-256 (Q3506406) (← links)
- Non-linear Reduced Round Attacks against SHA-2 Hash Family (Q3511168) (← links)
- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family (Q3540148) (← links)
- Collisions and Other Non-random Properties for Step-Reduced SHA-256 (Q3644206) (← links)
- Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 (Q5504547) (← links)
- New Collision Attacks against Up to 24-Step SHA-2 (Q5504614) (← links)
- Quantum image encryption algorithm based on Fisher-Yates algorithm and logistic mapping (Q6566211) (← links)