Chang, S.
, Perlner, R.
, Burr, W.
, Sonmez, M.
, Kelsey, J.
, Paul, S.
and Bassham, L.
(2012),
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition, NIST Interagency/Internal Report (NISTIR), National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.IR.7896
(Accessed December 6, 2024)