Cited By
View all- Kim HKim DYi OKim J(2019)Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform securityMultimedia Tools and Applications10.1007/s11042-018-5630-478:3(3107-3130)Online publication date: 1-Feb-2019
- Lopriore L(2018)Access right management by extended password capabilitiesInternational Journal of Information Security10.1007/s10207-017-0390-017:5(603-612)Online publication date: 1-Oct-2018
- Ahmad MKhurana SSingh SAlsharari H(2017)A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps3D Research10.1007/s13319-017-0123-18:2(1-15)Online publication date: 1-Jun-2017
- Show More Cited By