Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Rogaway P., Shrimpton T., “Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance”, Fast Software Encryption, FSE 2004, Lect. Notes Comput. Sci., 3017, 2004, 371–388 | DOI | Zbl
[2] F. Ablayev, A. Vasiliev, “Cryptographic quantum hashing”, Laser Physics Letters, 11:2 (2014), 025202 | DOI | MR
[3] Gottesman D., Chuang I., Quantum digital signatures, arXiv: quant-ph/0105032
[4] Vasiliev A., Quantum communications based on quantum hashing, arXiv: 1312.1661
[5] Razborov A. A., Szemeredi E., Wigderson A., “Constructing small sets that are uniform in arithmetic progressions”, Comb. Probab. Comput., 2:4 (1993), 513–518 | DOI | MR | Zbl
[6] Michalewicz Z., Genetic Algorithms+Data Structures=Evolution Programs, 3rd ed., rev. extend., Springer, Heidelberg etc., 1996, xx+387 pp. | MR | Zbl
[7] Kirkpatrick S., Gelatt C. D., Jr., Vecchi M. P., “Optimization by simulated annealing”, Science, 220:4598 (1983), 671–680 | DOI | MR | Zbl