Abstract
In this paper, we investigate Keccak - the cryptographic hash function adopted as the SHA-3 standard. We propose a malicious variant of the function, ......
小提示:本篇文献需要登录阅读全文,点击跳转登录