Author of the publication

Analysis of Zipper as a Hash Function.

, , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 392-403. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Double Length Compression Function Based on Block Cipher., , and . I. J. Network Security, 4 (2): 121-127 (2007)Web Service Discovery with UDDI Based on Semantic Similarity of Service Properties., , and . SKG, page 454-457. IEEE Computer Society, (2007)Analysis of All-or-Nothing Hash Functions., , , and . J. Inf. Sci. Eng., 24 (5): 1473-1484 (2008)Analysis of Zipper as a Hash Function., , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 392-403. Springer, (2008)Convertible Multi-authenticated Encryption Scheme for Data Communication., , and . I. J. Network Security, 17 (1): 40-48 (2015)Low complexity frequency-domain despreading for cyclic-prefix CDMA systems., and . IEEE Communications Letters, 8 (6): 339-341 (2004)Robustness of pole assignment in a specified circular region for discrete-time grey systems.. Int. J. Systems Science, 32 (2): 269-272 (2001)D-Pole placement robustness for perturbed grey discrete-time-delay systems., , and . Int. J. Systems Science, 32 (5): 639-642 (2001)Collaborative storytelling experiences in social media: Influence of peer-assistance mechanisms., , , , and . Computers & Education, 57 (2): 1544-1556 (2011)A 216fps 4096×2160p 3DTV set-top box SoC for free-viewpoint 3DTV applications., , , , , , , , , and 1 other author(s). ISSCC, page 124-126. IEEE, (2011)