<--- Back to Details
First PageDocument Content
NIST hash function competition / Eli Biham / SHA-2 / SHA-1 / Preimage attack / MD5 / Advanced Encryption Standard / Keccak / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions
Date: 2010-08-24 17:09:24
NIST hash function competition
Eli Biham
SHA-2
SHA-1
Preimage attack
MD5
Advanced Encryption Standard
Keccak
Collision attack
Cryptography
Error detection and correction
Cryptographic hash functions

Updates on SHAvite-3 Eli Biham1 and Orr Dunkelman2 1

Add to Reading List

Source URL: www.cs.technion.ac.il

Download Document from Source Website

File Size: 155,36 KB

Share Document on Facebook

Similar Documents

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh†

DocID: 1nWeC - View Document

A Note on Comparing the AES Candidates Eli Biham Computer Science Department Technion { Israel Institute of Technology Haifa 32000, Israel Email:

DocID: 1mlxI - View Document

New Types of Cryptanalytic Attacks Using Related Keys Eli Biham Presented by: Nael Masalha

DocID: 1jvxK - View Document

In How Many Ways Can You Write Rijndael? Elad Barkan and Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel Email: {barkan,biham}@cs.technion.ac.il

DocID: 1jkiK - View Document

The Truth on TPy Eli Biham∗ Jennifer Seberry† February 29, 2008

DocID: 1b89t - View Document