共 19 条
[1]
Akin Abdulkadir., P 3 INT C SECURITY I
[2]
Alagic G., 2022, Status report on the third round of the nist post-quantum cryptography standardization process
[3]
Athanasiou GS, 2014, 2014 6TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING (ISCCSP), P538, DOI 10.1109/ISCCSP.2014.6877931
[4]
Bertoni G., 2012, SELECTED AREAS CRYPT, V18, P320, DOI [10.1007/978-3-642-28496-019, DOI 10.1007/978-3-642-28496-019]
[5]
Bertoni G, 2008, LECT NOTES COMPUT SC, V4965, P181
[6]
Bertoni Guido., 2012, Directions in Authenticated Ciphers, P159
[7]
Bertoni Guido., 2011, Submission to NIST (Round 3), V6, P16
[9]
Coron JS, 2005, LECT NOTES COMPUT SC, V3621, P430
[10]
Dworkin M.J., 2015, SHA 3 STANDARD PERMU