First Page | Document Content | |
---|---|---|
![]() Date: 2015-08-04 11:34:10Cryptography Cryptographic hash functions Hashing NIST hash function competition SHA-3 Secure Hash Algorithm SHA-2 SHA-1 Hash-based message authentication code Secure Hash Standard Sponge function Hash function | Add to Reading List |
![]() | Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2DocID: 1sFzA - View Document |
![]() | Forestry The region’s forests function as habitat for a panoply of remarkable species, a sponge that sustains watersheds, and a resource for industry and recreation. At the same time, our forests confront the spread ofDocID: 1sscp - View Document |
![]() | Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2DocID: 1qZv0 - View Document |
![]() | Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2DocID: 1pRqy - View Document |
![]() | Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXPDocID: 1pqnF - View Document |