Author:
Bonnetain Xavier,Heim Boissier Rachelle,Leurent Gaëtan,Schrottenloher André
Publisher
Springer Nature Switzerland
Reference42 articles.
1. Lecture Notes in Computer Science;E Andreeva,2009
2. Aumasson, J.P., Jovanovic, P., Neves, S.: NORX v3. Submission to the Caesar competition (2016). https://competitions.cr.yp.to/round3/norxv30.pdf
3. Bao, Z., Dinur, I., Guo, J., Leurent, G., Wang, L.: Generic attacks on hash combiners. J. Cryptol. 33(3), 742–823 (2020). https://doi.org/10.1007/s00145-019-09328-w
4. Bao, Z., Guo, J., Li, S., Pham, P.: Evaluating the security of merkle-damgård hash functions and combiners in quantum settings. In: NSS. LNCS, vol. 13787, pp. 687–711. Springer (2022). https://doi.org/10.1007/978-3-031-23020-2_39
5. Lecture Notes in Computer Science;Z Bao,2017