"On security arguments of the second round SHA-3 candidates."

Elena Andreeva et al. (2012)

Details and statistics

DOI: 10.1007/S10207-012-0156-7

access: closed

type: Journal Article

metadata version: 2024-05-07