NIST hash function competition

Results: 214



#Item
181Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Language: English - Date: 2009-01-14 05:49:51
182NIST hash function competition / Hashing / MD6 / MD5 / MD4 / SHA-2 / SHA-1 / Collision resistance / Preimage attack / Error detection and correction / Cryptography / Cryptographic hash functions

Security Proofs for the MD6 Hash Function Mode of Operation by

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-11-05 16:27:34
183NIST hash function competition / Skein / Hashing / Threefish / Rotational cryptanalysis / SHA-2 / SHA-1 / Feistel cipher / Stefan Lucks / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.skein-hash.info

Language: English - Date: 2012-03-27 04:10:33
184NIST hash function competition / Grøstl / SHA-1 / Hash function / MD5 / Advanced Encryption Standard / Crypt / Collision resistance / MD4 / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
185NIST hash function competition / One-way compression function / Advanced Encryption Standard / Block cipher / Padding / GOST / Grøstl / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2008-10-24 02:19:12
186NIST hash function competition / Keccak / Joan Daemen / Block cipher / Differential cryptanalysis / Advanced Encryption Standard / Permutation / Linear cryptanalysis / Cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
187Cryptography / SHA-2 / SANDstorm hash / SHA-1 / MD6 / NaSHA / Keccak / Elliptic curve only hash / Collision attack / Error detection and correction / Cryptographic hash functions / NIST hash function competition

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:18:38
188Hashing / SHA-2 / SHA-1 / NIST hash function competition / Padding / Hash function / Crypt / Checksum / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:34:13
189SHA-2 / Benchmark / Java / Skein / CPU cache / Just-in-time compilation / Computing / Cryptographic hash functions / NIST hash function competition

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 15:02:22
190SHA-2 / NIST hash function competition / Crypt / Hash function / Skein / Hash list / Computer programming / Artificial intelligence / Key stretching / Cryptographic hash functions / Field-programmable gate array / Computing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 04:31:20
UPDATE