<--- Back to Details
First PageDocument Content
NIST hash function competition / Eli Biham / SHA-2 / SHA-1 / Preimage attack / MD5 / Advanced Encryption Standard / Keccak / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions
Date: 2010-08-24 17:09:24
NIST hash function competition
Eli Biham
SHA-2
SHA-1
Preimage attack
MD5
Advanced Encryption Standard
Keccak
Collision attack
Cryptography
Error detection and correction
Cryptographic hash functions

Updates on SHAvite-3 Eli Biham1 and Orr Dunkelman2 1

Add to Reading List

Source URL: www.cs.technion.ac.il

Download Document from Source Website

File Size: 155,36 KB

Share Document on Facebook

Similar Documents

Markov models / Error detection and correction / Dynamic programming / Viterbi algorithm / Forward algorithm / Algorithm / Applied mathematics / Mathematics / Statistics / Forwardbackward algorithm

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

DocID: 1rsaS - View Document

Signal processing / Error detection and correction / Equalization / Bit error rate / Error rate / Mathematics / Measurement / Computing

Daniels_meeting_cover.eps

DocID: 1rphC - View Document

Engineering / Computing / Technology / Parallel computing / Computer memory / Electronic design / Electronic engineering / Integrated circuit design / Embedded system / Multi-core processor / Error detection and correction / Software

1 Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

DocID: 1roDZ - View Document

Error detection and correction / Computing / Convolutional code / Viterbi algorithm / Discrete mathematics / Viterbi decoder / Mathematics / Forward error correction / List decoding / Andrew Viterbi / Algorithm / Turbo code

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

DocID: 1rlYO - View Document