Article,

Hash Functions Based on Three Permutations: A Generic Security Analysis.

, and .
IACR Cryptology ePrint Archive, (2011)

Meta data

Tags

    Users

    Comments and Reviews