Cited By
View all- Darivandpour JLe DAtallah M(2021)Secure two-party input-size reduction: Challenges, solutions and applicationsInformation Sciences10.1016/j.ins.2021.01.038567(256-277)Online publication date: Aug-2021
- Buckley LByrne JMoloney D(2018)Investigating the Impact of Suboptimal Hashing Functions2018 IEEE Games, Entertainment, Media Conference (GEM)10.1109/GEM.2018.8516265(324-331)Online publication date: Aug-2018
- Blasius A(2018)Generating a Rotation Reduction Perfect Hashing FunctionMathematics Magazine10.1080/0025570X.1995.1199627168:1(35-41)Online publication date: 11-Apr-2018
- Show More Cited By