“A Provably Secure Trapdoor Hash Function Based on k-ECAA” (2016) Asian Journal of Computer and Information Systems, 4(3). Available at: https://ajouronline.com/index.php/AJCIS/article/view/3855 (Accessed: 21 January 2026).