NIST hash function competition

Results: 214



#Item
101Espionage / SHA-2 / Cyberwarfare / Collision attack / NIST hash function competition / Hash function / Collision resistance / Computing / Collision / Cryptographic hash functions / Hashing / Cryptography

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:42:06
102NIST hash function competition / Skein / Search algorithms / Hash function / Stefan Lucks / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

S:/MAT-DTU/SHA3 analysis/Skein-observation.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:33:42
103NIST hash function competition / Secure Hash Standard / SHA-1 / Keccak / Federal Information Processing Standard / Crypt / National Institute of Standards and Technology / SHA-2 / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptographic hash functions

Federal Register / Vol. 79, No[removed]Wednesday, May 28, [removed]Notices product or service. In the case of a trade association, the applicant must certify that, for each company to be represented by the trade association

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-28 10:25:54
104NIST hash function competition / Hashing / Vlastimil Klíma / Preimage attack / Crypt / Hash function / CubeHash / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:14:28
105Cryptographic hash functions / Keccak / BLAKE / Advanced Encryption Standard / Crypt / Skein / Algorithm / SHA-2 / SHA-1 / Error detection and correction / NIST hash function competition / Cryptography

outbind://132-00000000C28D6AD45D681F4D837CF97C3377EF1B070066930

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-16 14:39:14
106Computer programming / Applied mathematics / Cryptographic hash functions / NIST hash function competition / Computing

outbind://90-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:23:58
107Mathematical analysis / Cryptographic hash functions / NIST hash function competition / ARX

ARXtools: A toolkit for ARX analysis Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:40:14
108Hashing / Search algorithms / Preimage attack / Collision resistance / Merkle–Damgård construction / JH / Collision attack / Hash function / Random oracle / Cryptography / Cryptographic hash functions / NIST hash function competition

SHA-3 Conference, March 2012, Improved Indifferentiability Security Bound for the JH Mode Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:56:40
109Keccak / Joan Daemen / Block ciphers / Skein / Threefish / Grøstl / Cryptography / NIST hash function competition / Cryptographic hash functions

Security Analysis Submissions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 12:50:52
110Ute / Keccak / NIST hash function competition / Cryptographic hash functions

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:39:22
UPDATE