1 |
Zulfany E. Rasjid, Benfano Soewito, Gunawan Witjaksono, and Edi Abdurachman, "A Review of Collisions in Cryptographic Hash Function Used in Digital Forensic Tools," International Conference on Computer Science and Computational Intelligence, vol. 2, pp. 381-392, Oct. 2017.
|
2 |
Ali Maetouq et al., "Comparison of Hash Function Algorithms Against Attacks: A Review" International Journal of Advanced Computer Science and Applications, vol. 9, no. 8, 2018.
|
3 |
Robbie Rahim, Iskandar Zulkarnain, and Hendra Jaya, "Double Hashing Technique in Closed Hashing Search Process," IOP Conference Series: Materials Science and Engineering, vol. 237, 2017.
|
4 |
Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov, Alex Petit Bianco, and Clement Baisse, Announcing the first SHA1 collision, https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html, Feb. 2007.
|
5 |
Wan Yeon Lee and Yun-Seok Choi, "Ultra-light Mutual Authentication Scheme based on Text Steganography Communication," Journal of the Korea Society of Computer and Information, vol. 24, no. 4, pp. 11-18, April. 2019.
DOI
|
6 |
Sangwook Lee, Ji Eun Song, Wan Yeon Lee, Young Woong Ko, and Heejo Lee, "Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations" IEICE Trans. Information and Systems, vol. E98-D, no. 1, pp. 95-97, Jan. 2015.
DOI
|
7 |
Saleh Saraireh, Jaafer Al-Saraiereh, and Mohammad Saraireh, "Integration of Hash-Crypto -Steganography for Efficient Security Technique," International Journal of Circuits, Systems and Signal Processing, vol. 12, 2018.
|
8 |
Richa Purohit, Upendra Mishra and Abhay Bansl, "A Survey on Recent Cryptographic Hash Function Design," International Journal of Emerging Trends and Technology in Computer Science, vol. 2, no. 1, pp. 117-122, Jan.-Feb. 2013.
|
9 |
Sung-Min Hwang and Seog-Gyu Kim, "Design of System for Avoiding Upload of Identical-file Using SA Hash Algorithm," Journal of the Korea Society of Computer and Information, vol. 19, no. 10, pp. 81-89, Oct. 2014.
DOI
|
10 |
Emmanuouel Kellinis and Konstantinos Papapanagiotou, "Using Steganography to Improve Hash Fuctions' Collision Resistance," International Conference on Security and Cryptiography, vol. 2, pp. 337-340, 2007.
|