Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Deukjo Hong
Collision Resistance of the JH Hash Function
IEEE Transactions on Information Theory
Computer Science Applications
Information Systems
Library
Information Sciences
Known-Iv Attacks on Triple Modes of Operation of Block Ciphers
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of the CRUSH Hash Function
Collision Analysis and Improvement of a Parallel Hash Function Based on Chaotic Maps With Changeable Parameters
International Journal of Digital Crime and Forensics
Software
A Keyed Hash Function
IOSR Journal of Mathematics
Analysis of the Kupyna-256 Hash Function
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On the Power of Memory in the Design of Collision Resistant Hash Functions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Preimages for the Tillich-Zémor Hash Function
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science