Keccak

Results: 146



#Item
81NIST hash function competition / Hashing / SHA-2 / Preimage attack / Grøstl / Keccak / Collision attack / Collision resistance / Advanced Encryption Standard / Cryptography / Error detection and correction / Cryptographic hash functions

SHA-3 Finalist Grostl: Round 3 Public Comments

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-29 09:20:30
82NIST hash function competition / Keccak / Advantage / Permutation / Hash function / ICE / Function / Cryptography / Mathematics / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:29:40
83Joan Daemen / Programming language theory / Software engineering / NOEKEON / ALGOL 68 / Field-programmable gate array / National Institute of Standards and Technology / Cryptography / NIST hash function competition / Keccak

OFFICIAL COMMENT: Keccak 1 of 1 Subject: OFFICIAL COMMENT: Keccak

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:55:18
84NIST hash function competition / Secure Hash Standard / SHA-1 / Keccak / Federal Information Processing Standard / Crypt / National Institute of Standards and Technology / SHA-2 / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptographic hash functions

Federal Register / Vol. 79, No[removed]Wednesday, May 28, [removed]Notices product or service. In the case of a trade association, the applicant must certify that, for each company to be represented by the trade association

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-28 10:25:54
85Cryptographic hash functions / Keccak / BLAKE / Advanced Encryption Standard / Crypt / Skein / Algorithm / SHA-2 / SHA-1 / Error detection and correction / NIST hash function competition / Cryptography

outbind://132-00000000C28D6AD45D681F4D837CF97C3377EF1B070066930

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-16 14:39:14
86Keccak / Joan Daemen / Block ciphers / Skein / Threefish / Grøstl / Cryptography / NIST hash function competition / Cryptographic hash functions

Security Analysis Submissions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 12:50:52
87Ute / Keccak / NIST hash function competition / Cryptographic hash functions

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:39:22
88Cryptographic hash functions / Hashing / Espionage / Keccak / Power analysis / HMAC / Side channel attack / Skein / Error detection and correction / Cryptography / NIST hash function competition

SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 16:02:00
89Grøstl / Skein / NIST hash function competition / Keccak / Blake

Theoretical Aspects of Hash Function Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:33:18
90Combinatorics / Permutation / Keccak / Degree of a continuous mapping / E-function / Ample line bundle / Mathematics / Topology / Abstract algebra

SHA-3 Conference, March 2012, On the Algabraic Degree of some SHA-3 Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:48:50
UPDATE