NIST hash function competition

Results: 214



#Item
161NIST hash function competition / Search algorithms / Hashing / ICE / Hash function / Keccak / BLAKE / Cryptography / Error detection and correction / Cryptographic hash functions

Hash Function Luffa Specification Ver[removed]Christophe De Canni`ere

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2014-02-05 22:04:49
162Fugue / Padding / Endianness / Block cipher modes of operation / Hash function / Bit array / ZPAQ / NIST hash function competition / Cryptography / Advanced Encryption Standard

The Hash Function “Fugue 2.0” Shai Halevi

Add to Reading List

Source URL: researcher.watson.ibm.com

Language: English - Date: 2012-04-03 14:49:38
163NIST hash function competition / Hashing / Fugue / Stream ciphers / Advanced Encryption Standard / Merkle–Damgård construction / VEST / Hash function / SHA-1 / Cryptographic hash functions / Cryptography / Error detection and correction

The Hash Function “Fugue” Shai Halevi

Add to Reading List

Source URL: researcher.watson.ibm.com

Language: English - Date: 2012-04-03 14:47:34
164Hashing / NIST hash function competition / Preimage attack / SHA-1 / Keccak / Random oracle / Provable security / MD5 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
165SHA-2 / SHA-1 / Preimage attack / Padding / Advanced Encryption Standard / NIST hash function competition / Block cipher / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

The SHAvite-3 Hash Function Tweaked Version[removed]

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2009-11-23 10:40:19
166Hashing / Padding / NIST hash function competition / Hash function / Crypt / Advanced Encryption Standard / Collision resistance / Merkle–Damgård construction / HAS-V / Cryptography / Cryptographic hash functions / Error detection and correction

Orange Labs Issy-les-Moulineaux, France

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2010-08-14 12:14:45
167Cryptography / NIST hash function competition / SHA-2 / Hash function / SHA-1 / MD5 / Hash tree / Keccak / HMAC / Error detection and correction / Cryptographic hash functions / Hashing

BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1 , Samuel Neves2 , Zooko Wilcox-O’Hearn3 , and Christian Winnerlein4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-26 14:43:26
168NIST hash function competition / SHA-2 / Preimage attack / SHA-1 / MD5 / Skein / Threefish / MD4 / Rotational cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-02-07 10:17:20
169JH / Advanced Encryption Standard / Q / ICE / Cryptographic hash functions / Serpent / Grøstl / One-way compression function / Cryptography / NIST hash function competition / Block cipher

The Hash Function JH 1

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2012-07-05 12:19:19
170Computer architecture / Cryptographic hash functions / Instruction set architectures / Keccak / Skein / SHA-1 / Fugue / SHA-2 / CPU cache / Error detection and correction / NIST hash function competition / Computing

SHA-3 Conference, August 2010, Comparative Performance Review of the SHA-3 Second-Round Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 13:39:10
UPDATE