Inproceedings,

Hash Functions Based on Three Permutations: A Generic Security Analysis.

, and .
CRYPTO, volume 7417 of Lecture Notes in Computer Science, page 330-347. Springer, (2012)

Meta data

Tags

Users

  • @dblp

Comments and Reviews