Toggle navigation
PDFSEARCH.IO
Document Search Engine - browse more than 18 million documents
Sign up
Sign in
<--- Back to Details
First Page
Document Content
Date: 2012-05-21 15:33:18
Grøstl
Skein
NIST hash function competition
Keccak
Blake
Theoretical Aspects of Hash Function Security
Add to Reading List
Source URL: csrc.nist.gov
Download Document from Source Website
File Size: 1,23 MB
Share Document on Facebook
Similar Documents
Cryptanalysis of Daniel J. Bernstein and Tanja Lange Skein with full 72 rounds
DocID: 1vqOc - View Document
Shawl A Fall In Love To make it you will need : 1 skein of Mohair Magic Glittz colors Copper Gold Brown Camel Cream Circular needles with 80cm cable
DocID: 1v91X - View Document
HOW TO MAKE ROPE CHROMOSOMES (Telomeres) You will need: Polyester rope- one skein Electrical tape in red, yellow and blue, and black (1/2” Wide). This usually comes packaged together. “DYMO” 3/8”x9.8’ black tap
DocID: 1upDR - View Document
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof
DocID: 1tqr0 - View Document
The Skein Hash Function Family Version 1.3 — 1 Oct 2010 Niels Ferguson Stefan Lucks Bruce Schneier
DocID: 1tn3m - View Document