Amanote Research

Amanote Research

    RegisterSign In

Hash Functions and Graphs With Large Girths

doi 10.1007/3-540-46416-6_44
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
G. Zémor
Publisher

Springer Berlin Heidelberg


Related search

Parameterized Hash Functions

Annales UMCS, Informatica
2012English

Cryptanalysis of Hash Functions With Structures

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Cryptographic Hash Functions

2010English

On Hash Functions Using Checksums

International Journal of Information Security
Information SystemsRiskComputer NetworksCommunicationsReliabilitySafetyQualitySoftware
2009English

Square Hash: Fast Message Authentication via Optimized Universal Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

The State of Cryptographic Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

Theoretical and Experimental Analysis of Cryptographic Hash Functions

Journal of Telecommunications and Information Technology
Electronic EngineeringCommunicationsElectricalComputer Networks
2019English

Javascript Security Using Cryptographic Hash Functions

Advanced Information Systems
2019English

Cryptographic Hash Functions and Attacks – A Detailed Study

International Journal of Advanced Research in Computer Science
2020English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy