F-HASH: Securing Hash Functions Using Feistel Chaining”, Cryptology ePrint Archive

Cached

Download Links

by Duo Lei
Citations:1 - 0 self