[1]
Lin, X. et al. 2025. Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]. IACR Transactions on Symmetric Cryptology. 2025, 1 (Mar. 2025), 328–356. DOI:https://doi.org/10.46586/tosc.v2025.i1.328-356.