NIST hash function competition

Results: 214



#Item
111Cryptographic hash functions / Hashing / Espionage / Keccak / Power analysis / HMAC / Side channel attack / Skein / Error detection and correction / Cryptography / NIST hash function competition

SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 16:02:00
112Grøstl / Skein / NIST hash function competition / Keccak / Blake

Theoretical Aspects of Hash Function Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:33:18
113Computing / Computer architecture / Reconfigurable computing / Field-programmable gate array / Keccak / Xilinx / Skein / Throughput / Pipeline / NIST hash function competition / Cryptographic hash functions / Electronic engineering

SHA-3 Conference, March 2012, Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:58:04
114Cryptographic hash functions / SHA-1 / SHA-2 / Keccak / Skein / Threefish / BLAKE / JH / Grøstl / Error detection and correction / NIST hash function competition / Cryptography

The Third SHA-3 Candidate Conference March 22-23, 2012 Washington Marriott Hotel, Washington, DC USA West End Ballroom CDE Program

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:20:30
115K1 / Tiny Encryption Algorithm / Block cipher / NIST hash function competition / Hash function / Merkle–Damgård construction / N-Hash / Cryptography / Cryptographic hash functions / Keccak

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:25:42
116National Institute of Standards and Technology / Applied mathematics / Cyberwarfare / Computing / Cryptographic hash functions / NIST hash function competition / Electronic submission

This workshop considers the full range of public key technology used for security decisions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 12:51:26
117NIST hash function competition / Hashing / Message authentication codes / Keccak / SHA-2 / HMAC / SHA-1 / Skein / JH / Error detection and correction / Cryptography / Cryptographic hash functions

SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:22:44
118Search algorithms / Error detection and correction / Hash function / Crypt / Secure Hash Standard / SHA-2 / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
119Keccak / Joan Daemen / SHA-2 / BLAKE / Skein / JH / RadioGatún / NIST hash function competition / Cryptographic hash functions / Cryptography

SHA-3 Selection Announcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-10-02 07:45:18
120Hashing / Message authentication codes / SHA-2 / HMAC / SHA-1 / Collision resistance / Collision / Preimage attack / NIST hash function competition / Cryptography / Error detection and correction / Cryptographic hash functions

NIST SP[removed]Draft, Recommendation for Applications Using Approved Hash Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 15:03:49
UPDATE