Avalanche effect (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Avalanche effect" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
low place
low place
18th place
17th place
5,032nd place
3,357th place
207th place
136th place
5th place
5th place

apprendre-en-ligne.net

  • Feistel, Horst (1973). "Cryptography and Computer Privacy". Scientific American. 228 (5): 15–23. Bibcode:1973SciAm.228e..15F. doi:10.1038/scientificamerican0573-15.

doi.org

  • Feistel, Horst (1973). "Cryptography and Computer Privacy". Scientific American. 228 (5): 15–23. Bibcode:1973SciAm.228e..15F. doi:10.1038/scientificamerican0573-15.
  • Upadhyay, D., Gaikwad, N., Zaman, M., & Sampalli, S. (2022). Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications. IEEE Access, 10, 112472–112486. https://doi.org/10.1109/ACCESS.2022.3215778

harvard.edu

ui.adsabs.harvard.edu

  • Feistel, Horst (1973). "Cryptography and Computer Privacy". Scientific American. 228 (5): 15–23. Bibcode:1973SciAm.228e..15F. doi:10.1038/scientificamerican0573-15.

iacr.org

eprint.iacr.org

psu.edu

citeseerx.ist.psu.edu

worldcat.org

  • William, Stallings (2016). Cryptography and network security : principles and practice (Seventh ed.). Boston. p. 136. ISBN 9780134444284. OCLC 933863805.{{cite book}}: CS1 maint: location missing publisher (link)