搜索结果: 1-2 共查到“军事学 secure hash functions”相关记录2条 . 查询时间(0.099 秒)
Correlated-Input Secure Hash Functions
foundations
font style='font-size:12px;'>
2012/3/28
We undertake a general study of hash functions secure under {\em correlated inputs}, meaning that security should be maintained when the adversary sees hash values of many related high-entropy inputs....
Correlated-Input Secure Hash Functions
foundations correlation-robustness avalanche effect
font style='font-size:12px;'>
2011/6/8
We undertake a general study of hash functions secure under {\em correlated inputs}, meaning that security should be maintained when the adversary sees hash values of many related high-entropy inputs....