Abstract
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to distinguishing Ke......
小提示:本篇文献需要登录阅读全文,点击跳转登录