Keccak

Results: 146



#Item
121Cryptographic hash functions / Search algorithms / Information retrieval / Information science / Computing / Trie / Hash tree / Hash function / Padding / Hashing / Error detection and correction / Cryptography

S : a flexible coding for tree hashing Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2014-04-18 11:02:15
122Cryptographic hash functions / Digital electronics / Field-programmable gate array / Xilinx / Keccak / SHA-2 / Altera / Joint Test Action Group / NIST hash function competition / Electronic engineering / Electronics / Fabless semiconductor companies

SHA-3 Conference, March 2012, Lightweight Implementations of SHA-3 Fialists on FPGAs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:06:14
123Cryptographic hash functions / Keccak / Skein / JH / Grøstl / SHA-1 / SHA-2 / Advanced Encryption Standard / Crypt / Error detection and correction / NIST hash function competition / Cryptography

SHA-3 Conference, March 2012, Evaluation of Compact FPGA Implementations for All SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:04:20
124

PDF Document

Add to Reading List

Source URL: keccak.noekeon.org

- Date: 2013-02-27 15:26:40
    125Keccak / Cryptographic hash function / JH / Grøstl / BLAKE / Block cipher / Crypt / Skein / ICE / NIST hash function competition / Error detection and correction / Cryptography

    Microsoft Word - SHA3_3rdCC_Submission_Paper_Kavun_Yalcin.doc

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-05-21 15:11:44
    126GOST standards / GOST / Hashing / SHA-1 / MD5 / Keccak / Hash function / Advanced Encryption Standard / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

    rebound_gost_r.tex Click here to view linked References Cryptanalysis of GOST R Hash Function Zongyue Wanga , Hongbo Yub,∗, Xiaoyun Wangb a Key

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-09-10 21:29:48
    127NIST hash function competition / SHA-2 / Keccak / Crypt / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

    SHA[removed]Workshop Call for Papers

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-05-13 08:24:21
    128Hashing / SHA-2 / SHA-1 / Keccak / NIST hash function competition / Secure Hash Standard / Crypt / Hash function / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

    DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-04-09 12:06:39
    129Preimage attack / Keccak / SHA-2 / Crypt / NIST hash function competition / Hash function / Lamport signature / Cryptographic hash functions / Error detection and correction / Cryptography

    Microsoft Outlook - Memo Style

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2013-11-05 14:22:31
    130Cryptographic hash functions / SHA-1 / Keccak / Skein / BLAKE / Secure Hash Standard / CubeHash / Vlastimil Klíma / SIMD / NIST hash function competition / Error detection and correction / Cryptography

    NISTIR 7764, Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-03-01 16:20:57
    UPDATE