NIST hash function competition

Results: 214



#Item
121SHA-2 / Hashing / Preimage attack / Collision resistance / NIST hash function competition / Crypt / Hash function / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

Draft FIPS 202: SHA-3 Permutation-Based Hash Standard-Status Update

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 10:20:26
122Error detection and correction / Computing / Cryptography / Computer programming / Mathematics / MD5 / SHA-1 / Crypt / NIST hash function competition / Cryptographic hash functions / Hashing / MD4

SHA3 WHERE WE’VE BEEN WHERE WE’RE GOING John Kelsey

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 09:09:51
123Cryptography / NIST hash function competition / Keccak / SHA-2 / SHA-1 / Crypt / Hash function / HMAC / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 15:45:01
124MD4 / SHA-1 / MD5 / SHA-2 / NIST hash function competition / Crypt / Hash function / Comparison of cryptographic hash functions / Error detection and correction / Cryptographic hash functions / Cryptography

SHA3: Past, Present and Future

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 11:09:26
125Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards

NIST Cryptographic Standards and Guidelines Development Program Briefing Book

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:41
126Joan Daemen / SHA-2 / John Kelsey / Crypt / Lane / Mathematics / Computing / NIST hash function competition / Cryptographic hash functions / Keccak

SHA[removed]Workshop August 22, 2014 University of California, Santa Barbara [Corwin Pavilion] Friday August 22, 2014 9:00 – 9:10

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-29 13:08:02
127Serial Peripheral Interface Bus / Skein / Keccak / Field-programmable gate array / Acer Laboratories Incorporated / SHA-2 / Voltage-controlled oscillator / Electronic engineering / NIST hash function competition / Electronics

© 2011 Center for Embedded Systems for Critical Applications NIST SHA-3 ASIC Datasheet -- NIST SHA-3 Competition Five Finalists on a Chip (Version 1.1)

Add to Reading List

Source URL: rijndael.ece.vt.edu

Language: English - Date: 2011-11-29 16:40:20
128Cryptographic hash functions / Hashing / Message authentication codes / SHA-2 / SHA-1 / FIPS 140-2 / Secure Hash Standard / NIST hash function competition / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptography standards

ITL Bulletin, May 2012, Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:22:13
129Mathematics / Keccak / NIST hash function competition / Joan Daemen / SHA-1 / Cryptol / Function / MD5 / Preimage attack / Cryptography / Error detection and correction / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-29 09:04:53
130NIST hash function competition / Hashing / SHA-1 / SHA-2 / Keccak / Skein / Cryptanalysis / Joan Daemen / Hash list / Error detection and correction / Cryptographic hash functions / Cryptography

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:55:35
UPDATE