NIST hash function competition

Results: 214



#Item
71Cryptographic hash functions / Search algorithms / Collision resistance / Hash function / Hash list / Advanced Encryption Standard / Cryptography / Hashing / Error detection and correction

Hash Workshop Wrapup Agreement • Don’t really know what we are doing – AES competition was a learning experience – Big safety margin

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:04:50
72Hash function / NIST hash function competition / Error detection and correction / BLAKE

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-29 09:14:20
73NIST hash function competition / Hashing / SHA-2 / Preimage attack / Grøstl / Keccak / Collision attack / Collision resistance / Advanced Encryption Standard / Cryptography / Error detection and correction / Cryptographic hash functions

SHA-3 Finalist Grostl: Round 3 Public Comments

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-29 09:20:30
74Pseudorandom number generators / Cryptographic hash function / Hashing / RdRand / Entropy / Random number generation / NIST hash function competition / AES instruction set / Key management / Cryptography / Randomness / Information theory

Intel and Random Numbers David Johnston [removed] NIST Random Number Workshop Inconvenient Truths

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:42:38
75NIST hash function competition / SHA-2 / Advanced Encryption Standard process / SHA-1 / Secure Hash Standard / Hash function / SANDstorm hash / Cryptographic hash functions / Error detection and correction / Cryptography

What hash functions were based on block ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:10:16
76JH / NIST hash function competition

Microsoft Word - AEW15_Schedule_03.docx

Add to Reading List

Source URL: astro.unl.edu

Language: English - Date: 2012-10-20 14:20:15
77JH / NIST hash function competition

Microsoft Word - AEW14_Schedule_04.docx

Add to Reading List

Source URL: astro.unl.edu

Language: English - Date: 2011-10-17 17:14:05
78Finite fields / Elliptic curve cryptography / Elliptic curve / Curve / NSA Suite B Cryptography / NIST hash function competition / SHA-2 / Elliptic Curve DSA / Cryptography / Cryptographic hash functions / Mathematics

How to manipulate curve standards: a white paper for the black hat Daniel J. Bernstein1,2 , Tung Chou1 , Chitchanok Chuengsatiansup1 , Andreas H¨ ulsing1 , 1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-23 00:04:01
79Preimage attack / NIST hash function competition / Hash function / Cryptography / Cryptographic hash functions / Hashing

outbind://31-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:15:46
80Daniel J. Bernstein / Cryptographic hash functions / NIST hash function competition / Hash function

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:47:18
UPDATE