Back to Results
First PageMeta Content
Hashing / SHA-2 / Hash function / HMAC / Endianness / Preimage attack / Padding / Collision attack / GOST / Error detection and correction / Cryptography / Cryptographic hash functions


Cryptographic Hash Function E DON - R Norwegian University of Science and Technology Trondheim, Norway
Add to Reading List

Document Date: 2009-02-11 09:26:04


Open Document

File Size: 467,01 KB

Share Result on Facebook

City

Technology / Trondheim / /

Company

Intel / Microsoft / /

Country

Norway / United States / Macedonia / Czech Republic / /

/

Facility

National Institute of Standards and Technology / The Norwegian University of Science / Norwegian University of Science / R Norwegian University of Science / University of California San Diego / Microsoft Visual Studio / /

/

IndustryTerm

hash algorithm / submitted algorithm / /

Organization

Macedonian Academy of Sciences and Arts / National Institute of Standards and Technology / Faculty of Information Technology / Mathematics and Electrical Engineering / Department of Telematics / Centre for Quantifiable Quality of Service / Centre of Excellence / Norwegian University of Science and Technology Trondheim / Norwegian University of Science / University of California San Diego / /

Person

Danilo Gligoroski / Rune Steinsmo Ødegård Marija Mihova / Danilo Gligoroski Rune Steinsmo Ødegård / Rune Steinsmo Ødegård / Marija Mihova / Johan Knapskog Ljupco Kocarev Aleš / Marija Mihova Svein Johan Knapskog / Ljupco Kocarev Aleš Drápal Vlastimil / Johan Knapskog / Ljupco Kocarev / /

/

Position

consultant / General / /

ProgrammingLanguage

C / C++ / /

PublishedMedium

Parameters / /

Technology

Hash Algorithm / submitted algorithm / Information Technology / Rn Hash algorithm / 1 Algorithm / originally submitted algorithm / little-endian / /

SocialTag