Getting the Best Out of Existing Hash Functions or What if We Are Stuck with (2008)

by Y Dodis, P Puniya
Venue:SHA?. Applied Cryptography and Network Security – ACNS ’08. LNCS