Chang, S.
, Perlner, R.
, Burr, W.
, Sonmez Turan, M.
, Kelsey, J.
, Paul, S.
and Bassham, L.
(2012),
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition:, , National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.IR.7896
(Accessed November 8, 2024)