On Security Arguments of the Second Round SHA-3 Candidates
International Journal of Information Security - Germany
doi 10.1007/s10207-012-0156-7
Full Text
Open PDFAbstract
Available in full text
Date
February 11, 2012
Authors
Publisher
Springer Science and Business Media LLC