Hash functions

Results: 1148



#Item
741Mathematical analysis / Cryptographic hash functions / NIST hash function competition / ARX

ARXtools: A toolkit for ARX analysis Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:40:14
742Hashing / Search algorithms / Preimage attack / Collision resistance / Merkle–Damgård construction / JH / Collision attack / Hash function / Random oracle / Cryptography / Cryptographic hash functions / NIST hash function competition

SHA-3 Conference, March 2012, Improved Indifferentiability Security Bound for the JH Mode Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:56:40
743Keccak / Joan Daemen / Block ciphers / Skein / Threefish / Grøstl / Cryptography / NIST hash function competition / Cryptographic hash functions

Security Analysis Submissions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 12:50:52
744Ute / Keccak / NIST hash function competition / Cryptographic hash functions

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:39:22
745Cryptographic hash functions / Hashing / Espionage / Keccak / Power analysis / HMAC / Side channel attack / Skein / Error detection and correction / Cryptography / NIST hash function competition

SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 16:02:00
746Road surface / Kentucky Route 9 / California postmile / Massachusetts Route 2 / Electronic Arts / Software development / Video game development / Cryptographic hash functions / SHA-2

CTC Financial Vote List 2.5 Highway Financial Matters Project # Allocation Amount County

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-05-08 15:04:10
747SHA-2 / Computing / Cryptographic hash functions / SHA-1 / CTC

CTC PROJECT ALLOCATIONS FOR JUNE 2014 PPNO Project # Program/Year Allocation Amount Prgm’d Amount

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-06-27 10:34:09
748Computing / Computer architecture / Reconfigurable computing / Field-programmable gate array / Keccak / Xilinx / Skein / Throughput / Pipeline / NIST hash function competition / Cryptographic hash functions / Electronic engineering

SHA-3 Conference, March 2012, Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:58:04
749Cryptographic hash functions / SHA-2 / Kentucky Route 9 / CTC / Road surface / Highway / Transport / Road transport / Land transport

CTC PROJECT ALLOCATION LIST – MAY 2014 Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-05-22 16:44:28
750Cryptographic hash functions / SHA-1 / SHA-2 / Keccak / Skein / Threefish / BLAKE / JH / Grøstl / Error detection and correction / NIST hash function competition / Cryptography

The Third SHA-3 Candidate Conference March 22-23, 2012 Washington Marriott Hotel, Washington, DC USA West End Ballroom CDE Program

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:20:30
UPDATE