Login / Signup
AES-based CCR Hash with High Security and Its Application to Zero-Knowledge Proofs.
Hongrui Cui
Chun Guo
Xiao Wang
Chenkai Weng
Kang Yang
Yu Yu
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
high security
security analysis
encryption algorithm
knowledge management
image encryption
information systems
software systems
hash functions