B Jungk, J Apfelbeck - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Secure cryptographic hash functions are core components in many applications like
challenge-response authentication systems or digital signature schemes. Many of these …