Andreeva, E.
, Bouillaguet, C.
, Fouque, P.
, Hoch, J.
, Kelsey, J.
, Shamir, A.
and Zimmer, S.
(2008),
Second Preimage Attacks on Dithered Hash Functions, Advances in Cryptology EUROCRYPT 2008 (Lecture Notes in Computer Science), Istanbul, TR, [online], https://doi.org/10.1007/978-3-540-78967-3_16, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=152101
(Accessed January 2, 2025)