2017
DOI: 10.1016/j.asoc.2017.03.009
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary design of hash function pairs for network filters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Hash functions have been applied for many security applications and protocols such as PGP, SSL, SSH, IPsec, TLS and S/MIME [4]. In order to provide these applications with a high level of security, we have to design a secure hash function against existing attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Hash functions have been applied for many security applications and protocols such as PGP, SSL, SSH, IPsec, TLS and S/MIME [4]. In order to provide these applications with a high level of security, we have to design a secure hash function against existing attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Hash function has been applied for many security applications and protocols such as PGP, SSL, SSH, IPsec, TLS and S/MIME [4]. In order to provide these applications with high level of security, we have to design a secure hash function against existing attacks.…”
Section: Literature Reviewmentioning
confidence: 99%