NIST hash function competition

Results: 214



#Item
21Hamar / MD6 / NIST hash function competition / Haugen

Mid  Distance  8-­‐12  Dog  Class WR CR $Musher  Name Martin  Dickel Martin  Dickel  Total Remy  Coste Remy  Coste  Total

Add to Reading List

Source URL: www.sleddogsport.net

Language: English - Date: 2015-04-20 00:24:37
22Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
23Skein / Threefish / Adder / Field-programmable gate array / Cryptographic hash function / Xilinx / Advanced Encryption Standard / ICE / Rotational cryptanalysis / Cryptography / Block ciphers / NIST hash function competition

Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
24Threefish / Rotational cryptanalysis / Cryptographic hash function / Block cipher / Hash function / Cryptanalysis / Cryptography / NIST hash function competition / Skein

The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
25SHACAL / NIST hash function competition / Ciphertext / SHA-1 / Boomerang attack / Cryptography / Cryptographic hash functions / Block cipher

improved_analysis_of_Shamata-BC.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 03:59:47
26JH / NIST hash function competition

Microsoft Word - AEW16_Schedule_04.docx

Add to Reading List

Source URL: astro.unl.edu

Language: English - Date: 2013-10-23 17:39:36
27SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
28Mathematics / NIST hash function competition / NaSHA / Quasigroup

Collision attack on NaSHA-512 Li Ji1 , Xu Liangyu1 , and Guan Xu2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-02-23 05:49:39
29SHA-2 / SHA-1 / NIST hash function competition / HMAC / Keccak / Skein / Crypt / Side channel attack / Computer security / Error detection and correction / Cryptographic hash functions / Cryptography

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-01 12:22:01
30SHACAL / SHA-1 / Ciphertext / NIST hash function competition / Index of cryptography articles / One-way compression function / Cryptography / Cryptographic hash functions / Block ciphers

Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 07:11:39
UPDATE