Report copyright - Cryptographic Hash Functions Part II...Hash functions based on block ciphers: a synthetic approach. CRYPTO’93 – security: Black, Rogaway, Shrimpton. Black-Box Analysis of the Block-Cipher-Based
Please pass captcha verification before submit form