First Page | Document Content | |
---|---|---|
![]() Date: 2012-06-20 11:10:16NIST hash function competition SHA-2 Advanced Encryption Standard process SHA-1 Secure Hash Standard Hash function SANDstorm hash Cryptographic hash functions Error detection and correction Cryptography | Add to Reading List |
![]() | The SANDstorm Hash Mark Torgerson and Richard Schroeppel Tim Draelos, Nathan Dautenhahn, Sean Malone, Andrea Walker, Michael Collins, Hilarie Orman* Cryptography and Information Systems Surety Department Sandia NationalDocID: 1sw3R - View Document |
![]() | What hash functions were based on block ciphersDocID: xknm - View Document |
![]() | PDF DocumentDocID: 10FE - View Document |
![]() | PDF DocumentDocID: Xnu - View Document |