Regenscheid, A.
, Perlner, R.
, Chang, S.
, Kelsey, J.
, Nandi, M.
and Paul, S.
(2009),
Status report on the first round of the SHA-3 cryptographic hash algorithm competition:, , National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.IR.7620
(Accessed November 8, 2024)