共 20 条
- [2] The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions [J]. 2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 811 - 816
- [3] Alizadeh M., 2012, SECURITY PERFORMANCE
- [4] Aumasson JP, 2010, LECT NOTES COMPUT SC, V6225, P1, DOI 10.1007/978-3-642-15031-9_1
- [5] Bogdanov A, 2011, LECT NOTES COMPUT SC, V6917, P312, DOI 10.1007/978-3-642-23951-9_21
- [6] Bussi K., 2016, IACR Cryptology ePrint Archive, V2016, P42
- [7] IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01): : 75 - 87
- [8] Daemen J., 1999, 1 CAND C AES1
- [9] A survey of lightweight-cryptography implementations [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 522 - 533
- [10] Elumalai R., 2011, International Journal of Scientific & Engineering Research, V2