Keccak

Results: 146



#Item
61LHash: A Lightweight Hash Function (Full Version)⋆ Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, and Le Dong Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China {wwl,zhanglei}@tca.iscas.ac.cn

LHash: A Lightweight Hash Function (Full Version)⋆ Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, and Le Dong Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China {wwl,zhanglei}@tca.iscas.ac.cn

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-25 09:43:17
62Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1  Department of Electrical and Computer Engineering, Northeastern Uni

Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern Uni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 21:07:24
63CA642: C RYPTOGRAPHY AND N UMBER T HEORY  8 1

CA642: C RYPTOGRAPHY AND N UMBER T HEORY 8 1

Add to Reading List

Source URL: www.computing.dcu.ie

Language: English - Date: 2014-10-30 10:52:49
64Keccak and SHA-3: code and standard updates Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 NXP

Keccak and SHA-3: code and standard updates Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-18 08:01:24
65Domain Extensions Morris Dworkin SHA[removed]Workshop August 22, 2014  Hint in Draft FIPS 202

Domain Extensions Morris Dworkin SHA[removed]Workshop August 22, 2014 Hint in Draft FIPS 202

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:53:18
66The Keccak Code Package Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1  1 STMicroelectronics

The Keccak Code Package Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:25:54
67SHA-3 Standard: Overview, Status, Public Comment

SHA-3 Standard: Overview, Status, Public Comment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:37
68Special Publication on Authenticated Encryption

Special Publication on Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:49:40
69Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010

Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010

Add to Reading List

Source URL: www-pequan.lip6.fr

Language: English - Date: 2011-09-20 16:50:32
70Spritz—a spongy RC4-like stream cipher and hash function Ronald L. Rivest MIT CSAIL Cambridge, MA[removed]removed]

Spritz—a spongy RC4-like stream cipher and hash function Ronald L. Rivest MIT CSAIL Cambridge, MA[removed]removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-10-27 13:26:00