Content deleted Content added
m replace x with × |
No edit summary |
||
Line 159:
Hirose also provides a proof in the Ideal Cipher Model.
== Sponge ==
The [[Sponge construction]] uses an unkeyed block cipher.
== See also ==
|
m replace x with × |
No edit summary |
||
Line 159:
Hirose also provides a proof in the Ideal Cipher Model.
== Sponge ==
The [[Sponge construction]] uses an unkeyed block cipher.
== See also ==
|