NIST hash function competition

Results: 214



#Item
51Keccak / NIST hash function competition / SHA-2 / Preimage attack / Merkle–Damgård construction / Crypt / Hash tree / SHA-1 / Secure Hash Standard / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Standard: Overview, Status, Public Comment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:37
52Keccak / Threefish / Cryptographic hash function / Joan Daemen / Grøstl / ARM architecture / Crypt / 64-bit / BLAKE / Cryptography / NIST hash function competition / Skein

Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010

Add to Reading List

Source URL: www-pequan.lip6.fr

Language: English - Date: 2011-09-20 16:50:32
53Keccak / Stream cipher / Hash function / Cryptography / NIST hash function competition / RC4

Spritz—a spongy RC4-like stream cipher and hash function Ronald L. Rivest MIT CSAIL Cambridge, MA[removed]removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-10-27 13:26:00
54Threefish / Skein / NIST hash function competition / SHA-1 / SHA-2 / Tiny Encryption Algorithm / MD5 / Differential cryptanalysis / Churning / Cryptography / Error detection and correction / Cryptographic hash functions

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-24 03:49:53
55JH / NIST hash function competition / Vanier Cup

Jr. Basketball Schedule[removed]Season DATE TIME LOCATION

Add to Reading List

Source URL: vanier.htcsd.ca

Language: English - Date: 2014-12-09 13:18:11
56Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cryptographic hash functions / Metrology / NIST hash function competition / Metre / Uncertainty / Text Retrieval Conference / Measurement / Science / Knowledge

Information Technology Laboratory Newsletter INSIDE THIS ISSUE November—December 2014

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-10-29 16:09:26
57JH / NIST hash function competition / CSB

GENERAL ACCOUNTING OFFICE

Add to Reading List

Source URL: gao.az.gov

Language: English - Date: 2014-10-30 13:32:59
58Skein / Threefish / Cryptographic hash functions / Block cipher / HMAC / Mihir Bellare / Hash function / Stefan Lucks / Cryptography / Hashing / NIST hash function competition

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
59Linear algebra / Keccak / NIST hash function competition / Matrices / Linear map / Exponential function / Transformation matrix / Weight / Kernel / Mathematics / Algebra / Transformation

Characterization of Column Parity Kernel and Differential Cryptanalysis of Keccak Yin Tan, Kalikinkar Mandal and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {y24tan,kmanda

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-01-19 20:48:05
60Hashing / Search algorithms / Keccak / SHA-2 / Hash function / SHA-1 / Password / Salt / NIST hash function competition / Cryptography / Cryptographic hash functions / Error detection and correction

Pleco and Plectron – Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {bo.zhu,x5fan,ggong}@uwaterloo.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-12 12:07:46
UPDATE