Back to Results
First PageMeta Content
Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions


Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with
Add to Reading List

Document Date: 2012-12-02 17:23:46


Open Document

File Size: 1,59 MB

Share Result on Facebook

City

Oslo / Keccak Permutation / Permutation / /

Company

STMicroelectronics / NXP Semiconductors / /

Organization

swiss army / /

Person

Ron Rivest / /

Technology

cryptography / /

SocialTag