On Security Arguments of the Second Round SHA-3 Candidates

International Journal of Information Security - Germany
doi 10.1007/s10207-012-0156-7