Author of the publication

SHA-1充分条件自动化求解算法 (New Algorithm for Automatic Deriving Sufficient Conditions of SHA-1).

, , , and . 计算机科学, 43 (8): 123-127 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic recognition and validation of the common carotid artery wall segmentation in 100 longitudinal ultrasound images: an integrated approach using feature selection, fitting and classification., , and . Medical Imaging: Image Processing, volume 7623 of SPIE Proceedings, page 76233W. SPIE, (2010)Ultrasound IMT measurement on a multi-ethnic and multi-institutional database: Our review and experience using four fully automated and one semi-automated methods., , , , , , , , , and 1 other author(s). Comput. Methods Programs Biomed., 108 (3): 946-960 (2012)Classification of disturbance vectors for collision attack in SHA-1., , and . Sci. China Inf. Sci., 58 (11): 1-10 (2015)New strategy for searching disturbance vector of SHA-1 collision attack., , , and . Sci. China Inf. Sci., 60 (12): 129101:1-129101:3 (2017)Hypothesis Validation of Far-Wall Brightness in Carotid-Artery Ultrasound for Feature-Based IMT Measurement Using a Combination of Level-Set Segmentation and Registration., , , , , , , and . IEEE Trans. Instrumentation and Measurement, 61 (4): 1054-1063 (2012)Reducible Polynomial over F2 Constructed by Trinomial sigma-LFSR., , , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 192-200. Springer, (2008)Joint learning of visual and spatial features for edit propagation from a single image., and . Vis. Comput., 36 (3): 469-482 (2020)Convergence of the High-Accuracy Algorithm for Solving the Dirichlet Problem of the Modified Helmholtz Equation., and . Complex., (2020)The 21st-Century Classroom Gamer., , and . Games Cult., 15 (2): 198-223 (2020)Search framework for neutral bits and boomerangs in SHA-1 collision attacks., , and . IET Inf. Secur., 17 (4): 647-663 (July 2023)