Login / Signup
Differential analysis of the ternary hash function Troika.
Christina Boura
Margot Funk
Yann Rotella
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
hash functions
data streams
image compression
lightweight