@dblp

Hash Functions Based on Three Permutations: A Generic Security Analysis.

, and . IACR Cryptology ePrint Archive, (2011)

Links and resources

Tags