Turan, M.
, Perlner, R.
, Bassham, L.
, Burr, W.
, Chang, D.
, Chang, S.
, Dworkin, M.
, Kelsey, J.
, Paul, S.
and Peralta, R.
(2011),
Status report on the second round of the SHA-3 cryptographic hash algorithm competition:, , National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.IR.7764
(Accessed December 30, 2024)