搜索结果: 1-2 共查到“密码学 secure hash functions”相关记录2条 . 查询时间(0.109 秒)
We undertake a general study of hash functions secure under {\em correlated inputs}, meaning that security should be maintained when the adversary sees hash values of many related high-entropy inputs....
We undertake a general study of hash functions secure under {\em correlated inputs}, meaning that security should be maintained when the adversary sees hash values of many related high-entropy inputs....