NIST hash function competition

Results: 214



#Item
11Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
12Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
13Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-14 07:18:05
14sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract  sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-09-06 14:06:03
15SHA-3 Conference, February 2009, Shabal

SHA-3 Conference, February 2009, Shabal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-05 11:30:32
16SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:34:10
17Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research  ECC 2008, Utrecht, Sep

Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
18Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-09-24 10:22:35
19Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical

Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical

Add to Reading List

Source URL: web.archive.org

Language: English
20Living with post quantum cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:17:26