W Cao, H Chen, H Shi, H Li, J Wang - Cryptology ePrint Archive, 2024 - eprint.iacr.org
SHA2 is widely used in various traditional public key ryptosystems, post-quantum
cryptography, personal identification, and network communication protocols. Therefore …