Grøstl

Results: 45



#Item
11Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
12Preimage attack / ICE / SHA-2 / SHA-1 / Hash function / VEST / Block cipher / Grøstl / Collision resistance / Cryptography / Error detection and correction / Cryptographic hash functions

SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 12:38:00
13Cryptography / Keccak / Advanced Encryption Standard / JH / SHA-2 / 64-bit / Grøstl / Addressing mode / Bitwise operation / NIST hash function competition / Computer architecture / Computing

SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-09 23:11:17
14Hashing / NIST hash function competition / Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / Grøstl / VEST / Whirlpool / Cryptography / Cryptographic hash functions / GOST standards

STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 15:45:44
15Cryptographic hash functions / Permutations / NIST hash function competition / Grøstl / Combinatorics / Advanced Encryption Standard / Block cipher / SHA-1 / SHA-2 / Cryptography / Mathematics / Error detection and correction

Improved Cryptanalysis of AES-like Permutations Jérémy Jean1 , María Naya-Plasencia2 , and Thomas Peyrin3 École Normale Supérieure, France INRIA Paris-Rocquencourt, France Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 06:21:47
16Keccak / Threefish / Cryptographic hash function / Joan Daemen / Grøstl / ARM architecture / Crypt / 64-bit / BLAKE / Cryptography / NIST hash function competition / Skein

Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010

Add to Reading List

Source URL: www-pequan.lip6.fr

Language: English - Date: 2011-09-20 16:50:32
17Cryptographic hash functions / Block ciphers / Advanced Encryption Standard / Keccak / Threefish / Skein / Joan Daemen / Grøstl / Crypt / Cryptography / NIST hash function competition / Error detection and correction

The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion] Zip files of the presentations and papers are now available. First Day

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 14:27:39
18NIST hash function competition / Hashing / SHA-2 / Preimage attack / Grøstl / Keccak / Collision attack / Collision resistance / Advanced Encryption Standard / Cryptography / Error detection and correction / Cryptographic hash functions

SHA-3 Finalist Grostl: Round 3 Public Comments

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-29 09:20:30
19Advanced Encryption Standard / Tiny Encryption Algorithm / Differential cryptanalysis / Grøstl / Crypt / Collision attack / Threefish / Cryptography / Cryptographic hash functions / NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:26:50
20SHA-2 / Hash function / Exclusive or / Grøstl / GOST / SHA-1 / Error detection and correction / Cryptographic hash functions / Cryptography

OFFICIAL COMMENT: Grostl 1 of 1 Subject: OFFICIAL COMMENT: Grostl From: "Søren S. Thomsen"

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-30 01:00:00
UPDATE