[1]
“A Provably Secure Trapdoor Hash Function Based on k-ECAA”, AJCIS, vol. 4, no. 3, Jun. 2016, Accessed: Jan. 21, 2026. [Online]. Available: https://ajouronline.com/index.php/AJCIS/article/view/3855