<--- Back to Details
First PageDocument Content
NIST hash function competition / Grøstl / SHA-1 / Hash function / MD5 / Advanced Encryption Standard / Crypt / Collision resistance / MD4 / Cryptography / Error detection and correction / Cryptographic hash functions
NIST hash function competition
Grøstl
SHA-1
Hash function
MD5
Advanced Encryption Standard
Crypt
Collision resistance
MD4
Cryptography
Error detection and correction
Cryptographic hash functions

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Download Document from Source Website

File Size: 624,24 KB

Share Document on Facebook

Similar Documents

Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl Kimmo Järvinen Department of Information and Computer Science Aalto University, School of Science and Technology

DocID: 1umz7 - View Document

High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof

DocID: 1tqr0 - View Document

Silicon Implementation of SHA-3 Finalists: BLAKE, Grøstl, JH, Keccak and Skein Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali and Patrick Schaumont Center for Embedded Systems for

DocID: 1mt6i - View Document

Grøstl – a SHA-3 candidate http://www.groestl.info Praveen Gauravaram1 , Lars R. Knudsen1 , Krystian Matusiewicz1 , Florian Mendel2 , Christian Rechberger2 , Martin Schl¨affer2 , and Søren S. Thomsen1 1

DocID: 1lGXP - View Document