Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
2010 ◽
Vol 23
(3)
◽
pp. 357-366
2018 ◽
Vol 7
(3.12)
◽
pp. 296
◽
2006 ◽
Vol 2
(1)
◽
pp. 79-85
◽