NIST hash function competition

Results: 214



#Item
41On the Computational Asymmetry of the S-boxes Present in Blue Midnight Wish Cryptographic Hash Function Danilo Gligoroski1 and Vlastimil Klima2 1  Department of Telematics, Norwegian University of Science and Technology,

On the Computational Asymmetry of the S-boxes Present in Blue Midnight Wish Cryptographic Hash Function Danilo Gligoroski1 and Vlastimil Klima2 1 Department of Telematics, Norwegian University of Science and Technology,

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-04-18 07:19:47
42A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010

A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010

Add to Reading List

Source URL: people.item.ntnu.no

Language: English - Date: 2010-11-15 08:00:24
431  Cryptographic Hash Function EDON-R Presented by Prof. Danilo Gligoroski

1 Cryptographic Hash Function EDON-R Presented by Prof. Danilo Gligoroski

Add to Reading List

Source URL: csrc.nist.gov

Language: English
44Microsoft PowerPoint - 1_BlueMidnightWish-Presentation-Final.ppt

Microsoft PowerPoint - 1_BlueMidnightWish-Presentation-Final.ppt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-05 10:49:12
45IS2: Guidelines for Authors

IS2: Guidelines for Authors

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-06-09 08:32:09
46Keccak and SHA-3: code and standard updates Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 NXP

Keccak and SHA-3: code and standard updates Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-18 08:01:24
47Standards for Efficient Cryptography  SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
48Domain Extensions Morris Dworkin SHA[removed]Workshop August 22, 2014  Hint in Draft FIPS 202

Domain Extensions Morris Dworkin SHA[removed]Workshop August 22, 2014 Hint in Draft FIPS 202

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:53:18
49Standards for Efficient Cryptography  SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
50The Keccak Code Package Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1  1 STMicroelectronics

The Keccak Code Package Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:25:54