Cited By
View all- Fleischmann EForler CLucks SWenzel J(2012)Weimar-DMProceedings of the 17th Australasian conference on Information Security and Privacy10.1007/978-3-642-31448-3_12(152-165)Online publication date: 9-Jul-2012
- Gauravaram PKnudsen L(2009)On Randomizing Hash Functions to Strengthen the Security of Digital SignaturesProceedings of the 28th Annual International Conference on Advances in Cryptology - EUROCRYPT 2009 - Volume 547910.5555/3088723.3088739(88-105)Online publication date: 26-Apr-2009
- Hirose S(2008)Collision Resistance of Double-Block-Length Hash Function against Free-Start AttackIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1093/ietfec/e91-a.1.74E91-A:1(74-82)Online publication date: 1-Jan-2008
- Show More Cited By