NIST hash function competition

Results: 214



#Item
21Mid	
  Distance	
  8-­‐12	
  Dog	
  Class WR CR $Musher	
  Name Martin	
  Dickel Martin	
  Dickel	
  Total Remy	
  Coste Remy	
  Coste	
  Total

Mid  Distance  8-­‐12  Dog  Class WR CR $Musher  Name Martin  Dickel Martin  Dickel  Total Remy  Coste Remy  Coste  Total

Add to Reading List

Source URL: www.sleddogsport.net

Language: English - Date: 2015-04-20 00:24:37
22Permutation-based symmetric cryptography and Keccak  Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
23Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction

Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
24The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
25improved_analysis_of_Shamata-BC.dvi

improved_analysis_of_Shamata-BC.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 03:59:47
26JH / NIST hash function competition

Microsoft Word - AEW16_Schedule_04.docx

Add to Reading List

Source URL: astro.unl.edu

Language: English - Date: 2013-10-23 17:39:36
27Dynamic SHA Zijie Xu E-mail:  Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
28Collision attack on NaSHA-512 Li Ji1 , Xu Liangyu1 , and Guan Xu2 1 2

Collision attack on NaSHA-512 Li Ji1 , Xu Liangyu1 , and Guan Xu2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-02-23 05:49:39
29An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-01 12:22:01
30Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de  Abstract. In this note we discuss some observation of the SHA-3 candida

Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 07:11:39