Permutation-Based Hash Chains with Application to Password HashingPublished in IACR Transactions on Symmetric Cryptology 2024(4), pp. 249-286 (2024), 2024Download SlidesShare on Bluesky Facebook LinkedIn Mastodon X (formerly Twitter) Previous Next