Grøstl

Results: 45



#Item
21Keccak / Joan Daemen / Block ciphers / Skein / Threefish / Grøstl / Cryptography / NIST hash function competition / Cryptographic hash functions

Security Analysis Submissions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 12:50:52
22Grøstl / Skein / NIST hash function competition / Keccak / Blake

Theoretical Aspects of Hash Function Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:33:18
23Cryptographic hash functions / SHA-1 / SHA-2 / Keccak / Skein / Threefish / BLAKE / JH / Grøstl / Error detection and correction / NIST hash function competition / Cryptography

The Third SHA-3 Candidate Conference March 22-23, 2012 Washington Marriott Hotel, Washington, DC USA West End Ballroom CDE Program

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:20:30
24Preimage attack / Advantage / SHA-1 / SHA-2 / Random oracle / Hash function / Grøstl / One-way compression function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Provable Security of BLAKE with Non-Ideal Commpressio Function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:14:18
25Preimage attack / Keccak / SHA-1 / SHA-2 / Collision resistance / Random oracle / Grøstl / MD5 / Hash function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Security Analysis and Commparison of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:31:40
26SHA-1 / NIST hash function competition / SHA-2 / Keccak / Grøstl / ECRYPT / Crypt / RIPEMD / Tiger / Cryptographic hash functions / Error detection and correction / Cryptography

ICT[removed]ECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information Society Technologies

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-18 12:34:52
27Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / ARIA / Grøstl / SHA-2 / Galois/Counter Mode / NIST hash function competition / Cryptography / Cryptographic hash functions / Whirlpool

Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob Markku-Juhani O. Saarinen Norwegian University of Science and Technology [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-07-16 03:56:34
28Cryptographic hash functions / Hashing / Keccak / BLAKE / Grøstl / Hash function / SHA-2 / SHA-1 / Error detection and correction / NIST hash function competition / Cryptography

Microsoft PowerPoint - Presentation_SHA3.pptx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:47:32
29Cryptographic hash functions / Keccak / Skein / JH / Grøstl / SHA-1 / SHA-2 / Advanced Encryption Standard / Crypt / Error detection and correction / NIST hash function competition / Cryptography

SHA-3 Conference, March 2012, Evaluation of Compact FPGA Implementations for All SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:04:20
30Keccak / Cryptographic hash function / JH / Grøstl / BLAKE / Block cipher / Crypt / Skein / ICE / NIST hash function competition / Error detection and correction / Cryptography

Microsoft Word - SHA3_3rdCC_Submission_Paper_Kavun_Yalcin.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:11:44
UPDATE