共 35 条
[1]
[Anonymous], 2011, The keccak reference
[2]
[Anonymous], 1995, Cipher and hash function design strategies based on linear and differential cryptanalysis
[3]
[Anonymous], 1994, ACM C COMP COMM SEC
[4]
BDP+16 Bertoni G., 2016, Submission to the CAESAR Competition
[5]
Bertoni G., 2011, Cryptographic sponge functions
[6]
Bertoni G., ECRYPT HASH WORKSH C
[7]
Bertoni G, 2008, LECT NOTES COMPUT SC, V4965, P181
[8]
Bertoni G, 2013, LECT NOTES COMPUT SC, V7881, P313, DOI 10.1007/978-3-642-38348-9_19
[9]
Bertoni Guido, 2008, KECCAK CRUNCHY CRYPT
[10]
Bertoni Guido, ADV CRYPTOLOGY EUROC