<--- Back to Details
First PageDocument Content
Keccak / NIST hash function competition / RadioGatún / Joan Daemen / SHA-1 / SHA-2 / National Security Agency / Hash function / Cryptographic hash functions / Error detection and correction / Cryptography
Date: 2013-02-11 13:30:30
Keccak
NIST hash function competition
RadioGatún
Joan Daemen
SHA-1
SHA-2
National Security Agency
Hash function
Cryptographic hash functions
Error detection and correction
Cryptography

Keccak and the SHA-3 Standardization

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 1,36 MB

Share Document on Facebook

Similar Documents

Physics / Quantum field theory / Quantum mechanics / Parity

Column Parity Mixers Ko Stoffelen and Joan Daemen Diffusion 2/17

DocID: 1xUPf - View Document

Cryptography / Cryptographic hash functions / Search algorithms / Pattern matching / Backtracking / Hash function / Sponge function / Block cipher / SHA-3 / SHA-1 / Stack / Regular expression

The making of K Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 and Gilles Van Assche1 1 STMicroelectronics {guido.bertoni,joan.daemen,gilles.vanassche}@st.com

DocID: 1vrFc - View Document

Fonctionnement d’AES 1 Présentation du système AES Le système de chiffrement à clé secrète AES est un système basé sur le système Rijdndael construit par Joan Daemen et Vincent Rijmen. Pour AES les blocs de do

DocID: 1uNEZ - View Document

Block ciphers and AES Cryptology, 2016 Autumn Joan Daemen Institute for Computing and Information Sciences Radboud University September 27, 2016

DocID: 1uDcs - View Document

Differential propagation analysis of K Joan Daemen and Gilles Van Assche STMicroelectronics Abstract. In this paper we introduce new concepts that help read and understand low-weight differential trails in K

DocID: 1usdg - View Document