A Vulnerability in Implementations of SHA-3,
SHAKE, EdDSA, and Other NIST-Approved
Algorithms : https://eprint.iacr.org/2023/331.pdf (pdf)