NIST hash function competition

Results: 214



#Item
141Data types / Primitive types / C++ / Keccak / NIST hash function competition / Pointer / C programming language / C++ classes / C / Computing / Computer programming / Software engineering

A so ware interface for K In this note, we propose an interface to K at the level of the sponge and duplex constructions, and inside K at the level of the K - f permutation. The purpose is twofold.

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-07-03 11:17:08
142Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction

Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
143Function / Summation / Advantage / Mathematics / Keccak / NIST hash function competition

Note on zero-sum distinguishers of K -f In [1], Jean-Philippe Aumasson and Willi Meier introduced zero-sum distinguishers, a method to generate zero-sum structures for reduced-round K - f [1600],

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
144NIST hash function competition / Integrated circuits / Electronic design automation / Cryptographic hash functions / Electronic design / Application-specific integrated circuit / Keccak / Field-programmable gate array / Standard cell / Electronic engineering / Electronics / Cryptography

SHA-3 Conference, March 2012, Lessons Learned from Designing a 65 nm ASIC for Evaluating Third Round SHA-3 Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:01:30
145Keccak / RadioGatún / Joan Daemen / Block cipher / Hash function / Cryptography / Cryptographic hash functions / NIST hash function competition

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-05-28 00:25:06
146NIST hash function competition / Permutation / Function / Random permutation statistics / Permutation polynomial / Mathematics / Combinatorics / Keccak

The K reference Guido B Joan D

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
147Power analysis / Keccak / NIST hash function competition / Side channel attack

SHA-3 Conference, August 2010, Building Power Analysis Resistant Implementations of Keccak

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 13:08:32
148Cryptographic hash functions / Digital electronics / Field-programmable gate array / Xilinx / Keccak / SHA-2 / Altera / Joint Test Action Group / NIST hash function competition / Electronic engineering / Electronics / Fabless semiconductor companies

SHA-3 Conference, March 2012, Lightweight Implementations of SHA-3 Fialists on FPGAs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:06:14
149Cryptographic hash functions / Keccak / Skein / JH / Grøstl / SHA-1 / SHA-2 / Advanced Encryption Standard / Crypt / Error detection and correction / NIST hash function competition / Cryptography

SHA-3 Conference, March 2012, Evaluation of Compact FPGA Implementations for All SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:04:20
150Keccak / Cryptographic hash function / JH / Grøstl / BLAKE / Block cipher / Crypt / Skein / ICE / NIST hash function competition / Error detection and correction / Cryptography

Microsoft Word - SHA3_3rdCC_Submission_Paper_Kavun_Yalcin.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:11:44
UPDATE