NIST hash function competition

Results: 214



#Item
131SHA-1 / NIST hash function competition / SHA-2 / Keccak / Grøstl / ECRYPT / Crypt / RIPEMD / Tiger / Cryptographic hash functions / Error detection and correction / Cryptography

ICT[removed]ECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information Society Technologies

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-18 12:34:52
132Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / ARIA / Grøstl / SHA-2 / Galois/Counter Mode / NIST hash function competition / Cryptography / Cryptographic hash functions / Whirlpool

Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob Markku-Juhani O. Saarinen Norwegian University of Science and Technology [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-07-16 03:56:34
133Functions and mappings / Fourier analysis / Keccak / NIST hash function competition / Function / ICE / Block cipher / Advanced Encryption Standard / Convolution / Mathematics / Mathematical analysis / Cryptography

CBEAM: Efficient Authenticated Encryption from Feebly One-Way φ Functions Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-12-12 12:39:27
134GOST / NIST hash function competition / Hashing / Keccak / Advanced Encryption Standard / OpenSSL / Block cipher / Data Encryption Standard / ARIA / Cryptography / GOST standards / Cryptographic hash functions

S TRI B OB : Authenticated Encryption from GOST R[removed]LPS Permutation (Extended Abstract) Markku-Juhani O. Saarinen ∗ Norwegian University of Science and Technology [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-05-31 01:59:06
135Hashing / Computing / NIST hash function competition / Skein / Threefish / Hash tree / Hash function / B-tree / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

parSkein-tm-final_eprint.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-10-02 04:40:32
136JH / NIST hash function competition

Bedford South School School Advisory Committee Minutes May 14, 2013 Present:

Add to Reading List

Source URL: www.bedfordsouth.ednet.ns.ca

Language: English - Date: 2014-02-07 08:12:40
137Cryptographic hash functions / Hashing / Keccak / BLAKE / Grøstl / Hash function / SHA-2 / SHA-1 / Error detection and correction / NIST hash function competition / Cryptography

Microsoft PowerPoint - Presentation_SHA3.pptx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:47:32
138SHA-2 / SHA-1 / Secure Hash Standard / HMAC / NIST hash function competition / Digital Signature Algorithm / Crypt / Message authentication code / NSA Suite B Cryptography / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS 180-4, Secure Hash Standard (SHS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 10:52:30
139Reconfigurable computing / Digital electronics / Altera / Xilinx / Field-programmable gate array / Keccak / NIST hash function competition / VHDL / Electronic engineering / Fabless semiconductor companies / Electronics

Joachim Strömbergson Keccak_in_FPGAs.pdf V1.1, [removed]

Add to Reading List

Source URL: secworks.se

Language: English - Date: 2013-05-03 09:15:12
140Electronic commerce / Key management / Hashing / Key size / SHA-1 / SHA-2 / RSA / Collision attack / NIST hash function competition / Cryptography / Cryptographic hash functions / Public-key cryptography

Microsoft PowerPoint - preneel_closing_isse12v4.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2013-10-24 09:07:43
UPDATE