Grøstl

Results: 45



#Item
1Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl Kimmo Järvinen Department of Information and Computer Science Aalto University, School of Science and Technology

Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl Kimmo Järvinen Department of Information and Computer Science Aalto University, School of Science and Technology

Add to Reading List

Source URL: users.ics.aalto.fi

Language: English - Date: 2010-08-15 15:20:50
    2High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof

    High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2009-11-11 12:35:56
      3Silicon Implementation of SHA-3 Finalists: BLAKE, Grøstl, JH, Keccak and Skein Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali and Patrick Schaumont Center for Embedded Systems for

      Silicon Implementation of SHA-3 Finalists: BLAKE, Grøstl, JH, Keccak and Skein Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali and Patrick Schaumont Center for Embedded Systems for

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2011-05-19 03:02:40
        4Grøstl – a SHA-3 candidate http://www.groestl.info Praveen Gauravaram1 , Lars R. Knudsen1 , Krystian Matusiewicz1 , Florian Mendel2 , Christian Rechberger2 , Martin Schl¨affer2 , and Søren S. Thomsen1 1

        Grøstl – a SHA-3 candidate http://www.groestl.info Praveen Gauravaram1 , Lars R. Knudsen1 , Krystian Matusiewicz1 , Florian Mendel2 , Christian Rechberger2 , Martin Schl¨affer2 , and Søren S. Thomsen1 1

        Add to Reading List

        Source URL: www.groestl.info

        Language: English - Date: 2011-10-06 10:54:44
          5(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1  State Key Laboratory of Information Securit

          (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1 State Key Laboratory of Information Securit

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2012-09-10 00:05:29
            6Improved Rebound Attack on the Finalist Grøstl Jérémy Jean1 María Naya-Plasencia2 1 École

            Improved Rebound Attack on the Finalist Grøstl Jérémy Jean1 María Naya-Plasencia2 1 École

            Add to Reading List

            Source URL: fse2012.inria.fr

            Language: English - Date: 2012-03-28 03:18:43
              7Efficient Vector Implementations of AES-based Designs: A Case Study and New Implemenations for Grøstl Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schl¨affer1 , Peter Schwabe2 , David Seywald, and Wol

              Efficient Vector Implementations of AES-based Designs: A Case Study and New Implemenations for Grøstl Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schl¨affer1 , Peter Schwabe2 , David Seywald, and Wol

              Add to Reading List

              Source URL: cryptojedi.org

              Language: English - Date: 2013-02-01 12:17:47
                8Grøstl Implementation Guide Krystian Matusiewicz1 , Martin Schl¨affer2 , and Søren S. Thomsen3 1 Intel Technology Poland IAIK, Graz University of Technology

                Grøstl Implementation Guide Krystian Matusiewicz1 , Martin Schl¨affer2 , and Søren S. Thomsen3 1 Intel Technology Poland IAIK, Graz University of Technology

                Add to Reading List

                Source URL: www.groestl.info

                Language: English - Date: 2012-03-09 09:11:48
                  9Side-Channel Analysis of Grøstl and Skein

                  Side-Channel Analysis of Grøstl and Skein

                  Add to Reading List

                  Source URL: ieee-security.org

                  Language: English - Date: 2012-06-05 18:18:16