Login / Signup

Hash Functions Based on Three Permutations: A Generic Security Analysis.

Bart MenninkBart Preneel
Published in: CRYPTO (2012)
Keyphrases