Joan Daemen

Results: 53



#Item
31The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion] Zip files of the presentations and papers are now available.  First Day

The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion] Zip files of the presentations and papers are now available. First Day

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 14:27:39
32RADIOGATÚN, a belt-and-mill hash function Guido Bertoni, Joan Daemen, Michaël Peeters* and Gilles Van Assche STMicroelectronics

RADIOGATÚN, a belt-and-mill hash function Guido Bertoni, Joan Daemen, Michaël Peeters* and Gilles Van Assche STMicroelectronics

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:21:14
33

PDF Document

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2001-04-12 08:18:08
34OFFICIAL COMMENT: Keccak  1 of 1 Subject: OFFICIAL COMMENT: Keccak

OFFICIAL COMMENT: Keccak 1 of 1 Subject: OFFICIAL COMMENT: Keccak

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:55:18
35Security Analysis Submissions

Security Analysis Submissions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 12:50:52
36SHA-3 Selection Announcement

SHA-3 Selection Announcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-10-02 07:45:18
37SHA[removed]Workshop August 22, 2014 University of California, Santa Barbara [Corwin Pavilion] Friday August 22, 2014 9:00 – 9:10

SHA[removed]Workshop August 22, 2014 University of California, Santa Barbara [Corwin Pavilion] Friday August 22, 2014 9:00 – 9:10

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-29 13:08:02
38ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-29 09:04:53
39ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:55:35
40Joan Daemen, Michaël Peeters, Gilles Van Assche, Vincent Rijmen  The NOEKEON

Joan Daemen, Michaël Peeters, Gilles Van Assche, Vincent Rijmen The NOEKEON

Add to Reading List

Source URL: gro.noekeon.org

Language: English - Date: 2013-02-27 15:26:38