Back to Results
First PageMeta Content
Cryptography / SHA-1 / SHA-2 / NaSHA / SANDstorm hash / Elliptic curve only hash / Keccak / Collision attack / Preimage attack / Error detection and correction / NIST hash function competition / Cryptographic hash functions


Document Date: 2009-04-19 10:02:27


Open Document

File Size: 152,50 KB

Share Result on Facebook

Company

BMW / Sirrix AG / AMD / Intel / /

/

Facility

University Weimar / National Institute of Standards and Technology / William E. Hall / /

IndustryTerm

interest algorithms / software speed list / claimed software performance / hash algorithms / reference algorithm / feistel network / balanced feistel network / message expansion algorithm / software performance / cryptographic hash algorithms / unbalanced feistel network / candidate algorithms / /

Organization

National Institute of Standards and Technology / /

Person

Thomas Fuhr / Jacques Patarin / J. Daemen / Olivier Billet / Jongtae Lee / Bob Hattersley / Ale Drpal / Joan Daemen / Adrian Antipa / Niels Ferguson / Jon Callas / Vadim Lyubashevsky / Orhun Kara / Christophe De Canniere / Ralf-Philipp Weinmann / Charles Bouillaguet / Stphane Manuel / G. Bertoni / Jongin Lim / Smile Markovski / Phil Hawkes / Aline Gouget / Joana Treger / Sren S. Thomsen / Jean-Philippe Aumasson / Daniel R. L. Brown / Daniel Augot / Louis Goubin / Chris Peikert / Pierre-Alain Fouque / Thomas Pornin / Hisayoshi Sato / Lars R. Knudsen / Mara Naya-Plasencia / Mikhail Maslennikov / Ivica Nikoli / Rene Struik / Christian Rechberger / G. Van Assche / Shay Gueron / Nicky Mouha / Toru Akishita / Valerie Nachef / Doug Whiting / Olivier Ly / Matt Robshaw / Ivica Nikolic / Emmanuel Bresson / Mihir Bellare / Krystian Matusiewicz / Martin Schlffer Florian Mendel / Cryptographic Hash / Alon Rosen / Ethan Heilman / Dmitry Khovratovich / Peter SchmidtNielsen / Cevat Manap / Praveen Gauravaram / Marija Mihova / Philippe Gaborit / Michael Kounavis / Thomas Icart / Orr Dunkelman / Daniele Micciancio / Jesang Lee / Daniel J. Bernstein / Christophe Clavier / Jason Martin / Vlastimil Klima / Daniel Penazzi / Tomislav Nad / Gilles Van Assche / Scott Fluhrer / Kota Ideguchi / Dai Watanabe / Danilo Gligoroski / Mohamed El-Hadedy / Jaechul Sung / Hirotaka Yoshida / John Kelsey / Thomas Peyrin / Reinhard / Willi Meier / Ferhat Karakoc / Shiho Moriai / Gilles Macario-Rat / Robert J. Jenkins Jr. / Mario Lamberger / Jrn Amundsen / Martin Schlffer / Jean-Franois Misarsky / Jesse Walker / Adem Atalay / Luca Henzen / Kyoji Shibutani / Marion Videau / Gil Dogon / Yuriy Arbitman / M. Peeters / Martin Schlaeffer / Yannick Seurin / Aleksandra Mileva / Nicolas Sendrier / Jason Worth Martin / Sangjin Lee / Taizo Shirai / Eli Biham / Svein Johan Knapskog / Henri Gilbert / Hashing Algorithm / Yuseop Lee / Stefan Lucks / Cameron McDonald / Tadayoshi Kohno / Emmanuel Volte / Matt Campagna / Miguel Montes / Christian Forler Ewan Fleischmann / Alex Biryukov / Florian Mendel / Tetsu Iwata / David Bauer / Anne Canteaut / Gatan Leurent / Sebastiaan Indesteege / Brandon Enright / Matthieu Finiasz / Colin Bradbury / Stig Frode Mjlsnes / Shoichi Hirose / Christophe De Cannire / Bruce Schneier / Hidenori Kuwakado / Peter Maxwell / Michael Gorski / William Jalby / Rune Steinsmo / Horst Feistel / Johan Knapskog / Ljupco Kocarev / Pascal Paillier / /

/

Position

Candidate / /

Product

ECHO / AURORA / B 47 / Athlon 3200+ 2GHz / Olympus X-10 Digital Camera / /

ProgrammingLanguage

C * / /

ProvinceOrState

AURORA / /

PublishedMedium

Cryptology ePrint Archive / /

Technology

interest algorithms / message expansion algorithm / SHA-3 candidate algorithms / 7 Hash algorithm / 5 Hash algorithm / html / 2 Hash algorithm / hash algorithms / Candidate Hashing Algorithm / Hash algorithm / reference algorithm / cryptographic hash algorithms / SHA-3 algorithm / /

URL

http /

SocialTag