IT Security techniques — Hash-functions —Part 3: Dedicated hash-functionsTechniques de sécurité IT — Fonctions ...