First Page | Document Content | |
---|---|---|
![]() Date: 2012-06-07 14:18:38Cryptography SHA-2 SANDstorm hash SHA-1 MD6 NaSHA Keccak Elliptic curve only hash Collision attack Error detection and correction Cryptographic hash functions NIST hash function competition | Source URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 322,31 KBShare Document on Facebook |
![]() | The SANDstorm Hash Mark Torgerson and Richard Schroeppel Tim Draelos, Nathan Dautenhahn, Sean Malone, Andrea Walker, Michael Collins, Hilarie Orman* Cryptography and Information Systems Surety Department Sandia NationalDocID: 1sw3R - View Document |
![]() | What hash functions were based on block ciphersDocID: xknm - View Document |
![]() | PDF DocumentDocID: 10FE - View Document |
![]() | PDF DocumentDocID: Xnu - View Document |