共 15 条
- [1] Al-Odat Z. A., 2019, ARXIV190806086
- [2] Mitigation and Improving SHA-1 Standard Using Collision Detection Approach [J]. 2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018), 2018, : 333 - 338
- [3] A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations [J]. 2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 13 - 18
- [4] The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions [J]. 2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 811 - 816
- [7] Chandramohan Dhasarathan, 2017, Journal of King Saud University - Engineering Sciences, V29, P144, DOI 10.1016/j.jksues.2015.12.002
- [9] Jingwei Li, 2012, Information and Communication Security. 14th International Conference (ICICS 2012). Proceedings, P191, DOI 10.1007/978-3-642-34129-8_17
- [10] Loai A. T., 2019, J KING SAUD U COMPUT