@dblp

Security of Truncated Permutation Without Initial Value.

, and . ASIACRYPT (2), volume 13792 of Lecture Notes in Computer Science, page 620-650. Springer, (2022)

Links and resources

Tags