<--- Back to Details
First PageDocument Content
NIST hash function competition / Hashing / SHA-2 / Preimage attack / Grøstl / Keccak / Collision attack / Collision resistance / Advanced Encryption Standard / Cryptography / Error detection and correction / Cryptographic hash functions
Date: 2012-05-29 09:20:30
NIST hash function competition
Hashing
SHA-2
Preimage attack
Grøstl
Keccak
Collision attack
Collision resistance
Advanced Encryption Standard
Cryptography
Error detection and correction
Cryptographic hash functions

SHA-3 Finalist Grostl: Round 3 Public Comments

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 256,69 KB

Share Document on Facebook

Similar Documents

Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl Kimmo Järvinen Department of Information and Computer Science Aalto University, School of Science and Technology

DocID: 1umz7 - View Document

High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof

DocID: 1tqr0 - View Document

Silicon Implementation of SHA-3 Finalists: BLAKE, Grøstl, JH, Keccak and Skein Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali and Patrick Schaumont Center for Embedded Systems for

DocID: 1mt6i - View Document

Grøstl – a SHA-3 candidate http://www.groestl.info Praveen Gauravaram1 , Lars R. Knudsen1 , Krystian Matusiewicz1 , Florian Mendel2 , Christian Rechberger2 , Martin Schl¨affer2 , and Søren S. Thomsen1 1

DocID: 1lGXP - View Document