NIST hash function competition

Results: 214



#Item
171GOST standards / Grøstl / NIST hash function competition / GOST / Advanced Encryption Standard / Block cipher / MD5 / SHA-1 / Differential cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Integral Distinguishers for Reduced-round Stribog Riham AlTawy and Amr M. Youssef

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 15:56:16
172Grøstl / Differential cryptanalysis / Advanced Encryption Standard / Hash function / Block cipher / Cryptographic hash functions / Cryptography / NIST hash function competition / Error detection and correction

Updated Differential Analysis of Grøstl Martin Schl¨affer Institute for Applied Information Processing and Communications (IAIK)

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:06
173NIST hash function competition / Eli Biham / SHA-2 / SHA-1 / Preimage attack / MD5 / Advanced Encryption Standard / Keccak / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

Updates on SHAvite-3 Eli Biham1 and Orr Dunkelman2 1

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2010-08-24 17:09:24
174NIST hash function competition / Search algorithms / MD5 / BLAKE / Keccak / Hash function / Block cipher / Differential cryptanalysis / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

Analysis of BLAKE2 Jian Guo1 , Pierre Karpman1,2 , Ivica Nikoli´c1 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-29 13:50:06
175Keccak / NIST hash function competition / RadioGatún / Joan Daemen / SHA-1 / SHA-2 / National Security Agency / Hash function / Cryptographic hash functions / Error detection and correction / Cryptography

Keccak and the SHA-3 Standardization

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-11 13:30:30
176Block ciphers / Serpent / Preimage attack / Cryptography / Cryptographic hash functions / NIST hash function competition

The Hash Function Hamsi ¨ ul K¨ Ozg¨

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
177Block cipher / ICE / Stream cipher / Advantage / Cryptography / Keccak / NIST hash function competition

Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
178JH / Advanced Encryption Standard / Q / ICE / Cryptographic hash functions / Serpent / Grøstl / One-way compression function / Cryptography / NIST hash function competition / Block cipher

The Hash Function JH 1

Add to Reading List

Source URL: www3.ntu.edu.sg

Language: English - Date: 2011-01-18 19:17:26
179Hashing / Preimage attack / SHA-1 / MD5 / NIST hash function competition / Collision resistance / Crypt / HMAC / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

The Hitchhiker's Guide to the SHA-3 Competition

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2012-07-04 01:21:00
180Hashing / NIST hash function competition / Message authentication codes / MD6 / Collision resistance / HMAC / Preimage attack / Hash function / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

The MD6 hash function A proposal to NIST for SHA-3 Ronald L. Rivest

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-10-27 11:58:57
UPDATE