Return to Article Details
An example of a cryptographic hash function based on a modified sponge scheme
Download
Download PDF