First Page | Meta Content | |
---|---|---|
Document Date: 2012-06-07 14:18:38Open Document File Size: 322,31 KBShare Result on FacebookCityUCSB / /CompanyIntel / the AES / /CountryBelgium / United States / / /FacilityChang John Kelsey Mridul Nandi Souradyuti Paul Information Technology Laboratory National Institute of Standards and Technology Gaithersburg / Cryptographic Hash Algorithm Competition Abstract The National Institute of Standards and Technology / Introduction The National Institute of Standards and Technology / /IndustryTermreal hash algorithm / software implementations / hash algorithm / cryptographic hash algorithms / candidate hash algorithms / cryptographic protocols / legacy hash algorithms / software platforms / hash algorithms / mobile devices / cryptographic hash algorithm / candidate algorithms / /OrganizationU.S. Department of Commerce / U.S. government / Institute of Standards and Technology Gaithersburg / Institute of Standards and Technology Patrick D. Gallagher / National Institute of Standards and Technology / /PersonKelsey Mridul Nandi Souradyuti Paul / Gary Locke / Rene Peralta / William Burr / Quynh Dang / Donna Dodson / Lawrence Bassham / Lily Chen / Lisa Yin / James Nechvatal / CHI CRUNCH / Morris Dworkin / Patrick D. Gallagher / Elaine Barker / Sara Caswell / AURORA BLAKE / /PositionDeputy Director NISTIR / Secretary / candidate algorithms / /ProductECHO / /ProgrammingLanguageC / /ProvinceOrStateMaryland / /Technology2.3 Algorithm / candidate algorithms / SHA-3 Cryptographic Hash Algorithm / RAM / SHA-2 hash algorithms / hash algorithm / real hash algorithm / SHA-3 Cryptographic Hash Algorithm Competition Andrew Regenscheid Ray Perlner Shu-jen Chang John Kelsey Mridul Nandi Souradyuti Paul Information Technology / selected algorithm / SHA-2 algorithms / mobile devices / Encryption / SHA-1 hash algorithm / 14 algorithms / cryptography / legacy hash algorithms / candidate hash algorithms / evaluating candidate hash algorithms / cryptographic hash algorithms / proposed SHA-3 algorithm / hash algorithms / cryptographic hash algorithm / 21 candidate algorithms / 8-bit processors / same hash algorithms / 64 candidate algorithms / SHA-3 algorithm / /URLwww.nist.gov/hash-competition / /SocialTag |