Security/Efficiency Tradeoffs for Permutation-Based Hashing

by Phillip Rogaway , John Steinberger
Citations:10 - 2 self