NIST hash function competition

Results: 214



#Item
31Character encoding / String / Parity of a permutation / Keccak / Cryptographic hash function / Bitcoin / Structure / Hash function / Digital signature / Cryptography / Mathematics / NIST hash function competition

ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER FINAL DRAFT - UNDER REVIEW DR. GAVIN WOOD CO-FOUNDER & LEAD, ETHEREUM PROJECT

Add to Reading List

Source URL: gavwood.com

Language: English - Date: 2015-04-09 07:05:08
32Cryptography / Keccak / Advanced Encryption Standard / JH / SHA-2 / 64-bit / Grøstl / Addressing mode / Bitwise operation / NIST hash function competition / Computer architecture / Computing

SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-09 23:11:17
33Feistel cipher / ICE / Block cipher / Advanced Encryption Standard / Advantage / Permutations / Data Encryption Standard / Cryptography / Keccak / NIST hash function competition

LHash: A Lightweight Hash Function (Full Version)⋆ Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, and Le Dong Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China {wwl,zhanglei}@tca.iscas.ac.cn

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-25 09:43:17
34Stream ciphers / Cryptographic hash functions / Advanced Encryption Standard / Hamming weight / Py / Lookup table / Cryptography / Keccak / NIST hash function competition

Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern Uni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 21:07:24
35Hashing / NIST hash function competition / Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / Grøstl / VEST / Whirlpool / Cryptography / Cryptographic hash functions / GOST standards

STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 15:45:44
36Collision attack / Preimage attack / Spectral Hash / Hash function / Collision / NIST hash function competition / Oracle machine / Cryptography / Cryptographic hash functions / Random oracle

Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University ABSTRACT

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2015-03-07 12:34:01
37Cryptographic hash functions / Permutations / NIST hash function competition / Grøstl / Combinatorics / Advanced Encryption Standard / Block cipher / SHA-1 / SHA-2 / Cryptography / Mathematics / Error detection and correction

Improved Cryptanalysis of AES-like Permutations Jérémy Jean1 , María Naya-Plasencia2 , and Thomas Peyrin3 École Normale Supérieure, France INRIA Paris-Rocquencourt, France Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 06:21:47
38Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Paragraph[removed]of the Code of Ethics Estate agents and salespersons should be fully conversant with the EAO, its subsidiary legislation, this Code of Ethics, and other guidelines issued by the EAA from time to time and

Add to Reading List

Source URL: text.eaa.org.hk

Language: English - Date: 2013-07-22 00:20:20
39Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski [removed] Faculty of Information Technology, Mathematics and Electrical Engin

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-12-04 13:55:47
40JH / NIST hash function competition

Bus Schedule as of October 1, 2014 AIOI Station - SPring-8 Line Weekdays AIOI

Add to Reading List

Source URL: www.spring8.or.jp

Language: English - Date: 2014-10-07 02:20:11
UPDATE