NIST hash function competition

Results: 214



#Item
1On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

Add to Reading List

Source URL: www.anagram.com

- Date: 2010-11-11 14:43:00
    2Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    3Microsoft PowerPoint - AWACS-PQC

    Microsoft PowerPoint - AWACS-PQC

    Add to Reading List

    Source URL: www.cryptoexperts.com

    Language: English - Date: 2016-05-30 09:49:30
    4Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

    Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-11-30 11:00:03
    5Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

    Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-11-30 11:00:03
    6Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    7Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

    Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-09-08 06:00:03
    8Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

    Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English - Date: 2013-09-19 10:37:36
    9Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40