@dblp

Hash Functions Based on Three Permutations: A Generic Security Analysis.

, and . CRYPTO, volume 7417 of Lecture Notes in Computer Science, page 330-347. Springer, (2012)

Links and resources

Tags