First Page | Document Content | |
---|---|---|
![]() Date: 2009-04-19 10:02:27Cryptography SHA-1 SHA-2 NaSHA SANDstorm hash Elliptic curve only hash Keccak Collision attack Preimage attack Error detection and correction NIST hash function competition Cryptographic hash functions | Source URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 152,50 KBShare Document on Facebook |
![]() | The SANDstorm Hash Mark Torgerson and Richard Schroeppel Tim Draelos, Nathan Dautenhahn, Sean Malone, Andrea Walker, Michael Collins, Hilarie Orman* Cryptography and Information Systems Surety Department Sandia NationalDocID: 1sw3R - View Document |
![]() | What hash functions were based on block ciphersDocID: xknm - View Document |
![]() | PDF DocumentDocID: 10FE - View Document |
![]() | PDF DocumentDocID: Xnu - View Document |