Search results for: Shaohui Wang
Lecture Notes in Computer Science > Information Security Practice and Experience > Hash Functions and MACs > 274-284
Lecture Notes in Computer Science > Software Technologies for Embedded and Ubiquitous Systems > 203-214
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Hash Functions > 1-13