NIST hash function competition

Results: 214



#Item
151NIST hash function competition / SHA-2 / Keccak / Crypt / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

SHA[removed]Workshop Call for Papers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-13 08:24:21
152NIST hash function competition / Grøstl / Permutation

Tweaks on Grøstl http://www.groestl.info Praveen Gauravaram1 , Lars R. Knudsen1 , Krystian Matusiewicz2 , Florian Mendel3 , Christian Rechberger4 , Martin Schl¨affer3 , and Søren S. Thomsen1 1

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:57:31
153Advanced Encryption Standard / Grøstl / NIST hash function competition / Whirlpool / Field-programmable gate array / AES implementations / Hash function / Crypt / Xilinx / Cryptography / Cryptographic hash functions / Error detection and correction

On Optimized FPGA Implementations of the SHA-3 Candidate Grøstl? Bernhard Jungk, Steffen Reith, and J¨ urgen Apfelbeck Fachhochschule Wiesbaden University of Applied Sciences {jungk|reith}@informatik.fh-wiesbaden.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-12 08:20:15
154Grøstl / Advanced Encryption Standard / Hash function / Birthday attack / NIST hash function competition / One-way compression function / SHA-1 / Cryptography / Cryptographic hash functions / Error detection and correction

Grøstl Addendum Praveen Gauravaram Lars R. Knudsen Krystian Matusiewicz Florian Mendel Christian Rechberger

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:54:57
155Hashing / SHA-2 / SHA-1 / Keccak / NIST hash function competition / Secure Hash Standard / Crypt / Hash function / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-09 12:06:39
156Preimage attack / Keccak / SHA-2 / Crypt / NIST hash function competition / Hash function / Lamport signature / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-05 14:22:31
157Cryptographic hash functions / SHA-1 / Keccak / Skein / BLAKE / Secure Hash Standard / CubeHash / Vlastimil Klíma / SIMD / NIST hash function competition / Error detection and correction / Cryptography

NISTIR 7764, Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-03-01 16:20:57
158NIST hash function competition / Hashing / Message authentication codes / Keccak / HMAC / Hash function / Crypt / ICE / VEST / Error detection and correction / Cryptography / Cryptographic hash functions

The K SHA-3 submission

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
159SIMD / Block cipher / Computing / Parallel computing / NIST hash function competition

Introduction Description

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-03-03 13:03:02
160SIMD / Block cipher / Hash function / NIST hash function competition / Merkle–Damgård construction / One-way compression function / Cryptographic hash functions / Cryptography / Computing

SHA-3 submission – Tweaked version: [removed]SIMD Is a Message Digest

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2010-02-23 10:07:00
UPDATE