Back to Results
First PageMeta Content
Cryptography / SHA-2 / SANDstorm hash / SHA-1 / MD6 / NaSHA / Keccak / Elliptic curve only hash / Collision attack / Error detection and correction / Cryptographic hash functions / NIST hash function competition


Document Date: 2012-06-07 14:18:38


Open Document

File Size: 322,31 KB

Share Result on Facebook

City

UCSB / /

Company

Intel / the AES / /

Country

Belgium / United States / /

/

Facility

Chang John Kelsey Mridul Nandi Souradyuti Paul Information Technology Laboratory National Institute of Standards and Technology Gaithersburg / Cryptographic Hash Algorithm Competition Abstract The National Institute of Standards and Technology / Introduction The National Institute of Standards and Technology / /

IndustryTerm

real hash algorithm / software implementations / hash algorithm / cryptographic hash algorithms / candidate hash algorithms / cryptographic protocols / legacy hash algorithms / software platforms / hash algorithms / mobile devices / cryptographic hash algorithm / candidate algorithms / /

Organization

U.S. Department of Commerce / U.S. government / Institute of Standards and Technology Gaithersburg / Institute of Standards and Technology Patrick D. Gallagher / National Institute of Standards and Technology / /

Person

Kelsey Mridul Nandi Souradyuti Paul / Gary Locke / Rene Peralta / William Burr / Quynh Dang / Donna Dodson / Lawrence Bassham / Lily Chen / Lisa Yin / James Nechvatal / CHI CRUNCH / Morris Dworkin / Patrick D. Gallagher / Elaine Barker / Sara Caswell / AURORA BLAKE / /

Position

Deputy Director NISTIR / Secretary / candidate algorithms / /

Product

ECHO / /

ProgrammingLanguage

C / /

ProvinceOrState

Maryland / /

Technology

2.3 Algorithm / candidate algorithms / SHA-3 Cryptographic Hash Algorithm / RAM / SHA-2 hash algorithms / hash algorithm / real hash algorithm / SHA-3 Cryptographic Hash Algorithm Competition Andrew Regenscheid Ray Perlner Shu-jen Chang John Kelsey Mridul Nandi Souradyuti Paul Information Technology / selected algorithm / SHA-2 algorithms / mobile devices / Encryption / SHA-1 hash algorithm / 14 algorithms / cryptography / legacy hash algorithms / candidate hash algorithms / evaluating candidate hash algorithms / cryptographic hash algorithms / proposed SHA-3 algorithm / hash algorithms / cryptographic hash algorithm / 21 candidate algorithms / 8-bit processors / same hash algorithms / 64 candidate algorithms / SHA-3 algorithm / /

URL

www.nist.gov/hash-competition / /

SocialTag