Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
Crossref DOI link: https://doi.org/10.1007/s11432-015-5389-4
Published Online: 2016-03-10
Published Print: 2016-05
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Yu, Hongbo
Hao, Yonglin
Bai, Dongxia
Text and Data Mining valid from 2016-03-10