NIST hash function competition

Results: 214



#Item
1

On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

Add to Reading List

Source URL: www.anagram.com

- Date: 2010-11-11 14:43:00
    2Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    3Cryptography / Emerging technologies / Quantum computing / Quantum cryptography / Post-quantum cryptography / Public-key cryptography / RSA / NIST hash function competition / National Institute of Standards and Technology / SHA-3 / Key / CRYPTREC

    Microsoft PowerPoint - AWACS-PQC

    Add to Reading List

    Source URL: www.cryptoexperts.com

    Language: English - Date: 2016-05-30 09:49:30
    4NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science

    Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-11-30 11:00:03
    5Cryptography / NIST hash function competition / Cryptographic hash functions / SHA-3 / Side-channel attack / Power analysis / Crypt

    Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-11-30 11:00:03
    6Cryptography / NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Joan Daemen / Gilles Van Assche / Differential cryptanalysis / Data Encryption Standard

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    7NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

    Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-09-08 06:00:03
    8Cryptographic hash functions / Cryptography / NIST hash function competition / Stream ciphers / SHA-3 / Hashing / Sponge function / RadioGatn / Gilles Van Assche / Joan Daemen / Hash function / Random oracle

    Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English - Date: 2013-09-19 10:37:36
    9NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Gilles Van Assche / Joan Daemen / Data Encryption Standard / Permutation / Differential cryptanalysis

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    UPDATE