about
Interpreting Hash Function Security ProofsProtecting privacy in a clinical data warehouse.A fingerprint encryption scheme based on irreversible function and secure authentication.A security framework for nationwide health information exchange based on telehealth strategy.New Second-Preimage Attacks on Hash FunctionsHerding Hash Functions and the Nostradamus Attack
P2860
description
2005 nî lūn-bûn
@nan
2005 թուականին հրատարակուած գիտական յօդուած
@hyw
2005 թվականին հրատարակված գիտական հոդված
@hy
2005年の論文
@ja
2005年論文
@yue
2005年論文
@zh-hant
2005年論文
@zh-hk
2005年論文
@zh-mo
2005年論文
@zh-tw
2005年论文
@wuu
name
Finding Collisions in the Full SHA-1
@ast
Finding Collisions in the Full SHA-1
@en
type
label
Finding Collisions in the Full SHA-1
@ast
Finding Collisions in the Full SHA-1
@en
prefLabel
Finding Collisions in the Full SHA-1
@ast
Finding Collisions in the Full SHA-1
@en
P2093
P356
P1476
Finding Collisions in the Full SHA-1
@en
P2093
Xiaoyun Wang
Yiqun Lisa Yin
P356
10.1007/11535218_2
P407
P577
2005-01-01T00:00:00Z