Constructing Secure Hash Functions from Weak Compression Functions: The Case for Non-Streamable Hash Functions (2006)

Cached

Download Links

by Moses Liskov
Citations:2 - 0 self