<--- Back to Details
First PageDocument Content
NIST hash function competition / Keccak / Joan Daemen / Block cipher / Differential cryptanalysis / Advanced Encryption Standard / Permutation / Linear cryptanalysis / Cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions
Date: 2013-02-27 15:26:40
NIST hash function competition
Keccak
Joan Daemen
Block cipher
Differential cryptanalysis
Advanced Encryption Standard
Permutation
Linear cryptanalysis
Cryptanalysis
Cryptography
Error detection and correction
Cryptographic hash functions

Add to Reading List

Source URL: keccak.noekeon.org

Download Document from Source Website

File Size: 1,01 MB

Share Document on Facebook

Similar Documents

Physics / Quantum field theory / Quantum mechanics / Parity

Column Parity Mixers Ko Stoffelen and Joan Daemen Diffusion 2/17

DocID: 1xUPf - View Document

Cryptography / Cryptographic hash functions / Search algorithms / Pattern matching / Backtracking / Hash function / Sponge function / Block cipher / SHA-3 / SHA-1 / Stack / Regular expression

The making of K Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 and Gilles Van Assche1 1 STMicroelectronics {guido.bertoni,joan.daemen,gilles.vanassche}@st.com

DocID: 1vrFc - View Document

Fonctionnement d’AES 1 Présentation du système AES Le système de chiffrement à clé secrète AES est un système basé sur le système Rijdndael construit par Joan Daemen et Vincent Rijmen. Pour AES les blocs de do

DocID: 1uNEZ - View Document

Block ciphers and AES Cryptology, 2016 Autumn Joan Daemen Institute for Computing and Information Sciences Radboud University September 27, 2016

DocID: 1uDcs - View Document

Differential propagation analysis of K Joan Daemen and Gilles Van Assche STMicroelectronics Abstract. In this paper we introduce new concepts that help read and understand low-weight differential trails in K

DocID: 1usdg - View Document