[1]裴悦琨,谷宇,连明月.基于FPGA的快速樱桃缺陷检测与识别系统设计[J].食品与机械,2020,36(8):129-134. [2]KIM H, PARK M, CHO J, et al. Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes[J]. Peer-to-Peer Networking and Applications, 2020, 13(22):489–513. [3]王永,陈燕,赵毅.基于分段Logistic映射的并行Hash函数构造算法[J].计算机工程与应用,2018,54(15):38-43+154. [4]GRASSI L, RECHBERGER C. Revisiting Gilbert's known-key distinguisher[J]. Designs Codes and Cryptography, 2020, 88(3):1401-1445. [5]杨官霞,周頔,张展.基于改进的MAC和μTESLA的MANET安全路由算法[J].电子技术应用,2018,44(6):94-98. [6]郝文江,宋斐,万月亮.可穿戴单警装备安全认证协议研究[J].信息网络安全,2018,213(9):31-35. [7]张国栋,应欢,杨寿国,等.嵌入式固件脆弱哈希函数自动识别与破解方法[J].北京邮电大学学报,2020,43(1):46-53. [8]刘为超,黄凯锋,李莉.Hash函数与椭圆曲线密码相融合的双向认证方案[J].吉林大学学报(理学版),2017,55(2):340-344. [9]邵天浩,张宏军,程恺,等.基于哈希和路网边权的地图匹配算法及其应用[J].计算机技术与发展,2020,30(8):140-146. [10]杨安邦,钱江波,董一鸿,等.基于列表监督的Hash排序算法[J].电信科学,2019,35(5):78-85. |