<--- Back to Details
First PageDocument Content
Hash function / MD5 / MD4 / N-Hash / Lattice problem / NIST hash function competition / Trie / SHA-2 / Collision resistance / Cryptographic hash functions / Cryptography / SHA-1
Date: 2012-06-20 11:05:04
Hash function
MD5
MD4
N-Hash
Lattice problem
NIST hash function competition
Trie
SHA-2
Collision resistance
Cryptographic hash functions
Cryptography
SHA-1

Cryptographic Hash Workshop[removed]LASH

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 656,36 KB

Share Document on Facebook

Similar Documents

On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

DocID: 1t9VA - View Document

Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

DocID: 1qZv0 - View Document

Cryptography / Emerging technologies / Quantum computing / Quantum cryptography / Post-quantum cryptography / Public-key cryptography / RSA / NIST hash function competition / National Institute of Standards and Technology / SHA-3 / Key / CRYPTREC

Microsoft PowerPoint - AWACS-PQC

DocID: 1qio2 - View Document

NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1q4rG - View Document