Keccak

Results: 146



#Item
61Feistel cipher / ICE / Block cipher / Advanced Encryption Standard / Advantage / Permutations / Data Encryption Standard / Cryptography / Keccak / NIST hash function competition

LHash: A Lightweight Hash Function (Full Version)⋆ Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, and Le Dong Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China {wwl,zhanglei}@tca.iscas.ac.cn

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-25 09:43:17
62Stream ciphers / Cryptographic hash functions / Advanced Encryption Standard / Hamming weight / Py / Lookup table / Cryptography / Keccak / NIST hash function competition

Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern Uni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 21:07:24
63MD4 / SHA-2 / SHA-1 / RIPEMD / MD5 / Hash function / Keccak / MD2 / Crypt / Error detection and correction / Cryptographic hash functions / Cryptography

CA642: C RYPTOGRAPHY AND N UMBER T HEORY 8 1

Add to Reading List

Source URL: www.computing.dcu.ie

Language: English - Date: 2014-10-30 10:52:49
64NIST hash function competition / Keccak / Hashing / Search algorithms / Joan Daemen / SHA-1 / MD5 / Hash function / Universal quantification / Error detection and correction / Cryptographic hash functions / Cryptography

Keccak and SHA-3: code and standard updates Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-18 08:01:24
65Keccak / NIST hash function competition

Domain Extensions Morris Dworkin SHA[removed]Workshop August 22, 2014 Hint in Draft FIPS 202

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:53:18
66NIST hash function competition / Cross-platform software / Search algorithms / Stream ciphers / X86-64 / Pointer / Joan Daemen / Hash function / LEX / Computer architecture / Computing / Keccak

The Keccak Code Package Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:25:54
67Keccak / NIST hash function competition / SHA-2 / Preimage attack / Merkle–Damgård construction / Crypt / Hash tree / SHA-1 / Secure Hash Standard / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Standard: Overview, Status, Public Comment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:37
68Key Wrap / Galois/Counter Mode / Block cipher / CCM mode / Triple DES / Crypt / Cryptography / Block cipher modes of operation / Keccak

Special Publication on Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:49:40
69Keccak / Threefish / Cryptographic hash function / Joan Daemen / Grøstl / ARM architecture / Crypt / 64-bit / BLAKE / Cryptography / NIST hash function competition / Skein

Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010

Add to Reading List

Source URL: www-pequan.lip6.fr

Language: English - Date: 2011-09-20 16:50:32
70Keccak / Stream cipher / Hash function / Cryptography / NIST hash function competition / RC4

Spritz—a spongy RC4-like stream cipher and hash function Ronald L. Rivest MIT CSAIL Cambridge, MA[removed]removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-10-27 13:26:00
UPDATE