Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
Lecture notes in computer science2006pp. 50–65
Citations Over TimeTop 10% of 2006 papers
Related Papers
- → HMNT: Hash Function Based on New Mersenne Number Transform(2020)14 cited
- Design and analysis of hash functions(2007)
- Security Proofs for the MD6 Hash Function Mode of Operation(2008)
- One-Way Hash Function Construction Based on Chaotic Message Expansion(2010)
- → A New Hash Function Based On The Hybrid Of Existing Message Digest Algorithms(2019)