On the security of multivariate hash functions

View PDF

Download Links

by Yiyuan Luo , Xuejia Lai
Citations:1 - 1 self