NOEKEON

Results: 98



#Item
91

PDF Document

Add to Reading List

Source URL: keccak.noekeon.org

- Date: 2013-02-27 15:26:40
    92S  : a flexible coding for tree hashing Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1

    S : a flexible coding for tree hashing Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2014-04-18 11:02:15
    93

    PDF Document

    Add to Reading List

    Source URL: keccak.noekeon.org

    - Date: 2013-02-27 15:26:40
      94The K  SHA-3 submission

      The K SHA-3 submission

      Add to Reading List

      Source URL: keccak.noekeon.org

      Language: English - Date: 2013-02-27 15:26:40
      95Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1

      Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1

      Add to Reading List

      Source URL: sponge.noekeon.org

      Language: English - Date: 2013-02-27 15:27:45
      96Cryptographic sponge functions  Guido B

      Cryptographic sponge functions Guido B

      Add to Reading List

      Source URL: sponge.noekeon.org

      Language: English - Date: 2013-02-27 15:27:45
      97

      PDF Document

      Add to Reading List

      Source URL: keccak.noekeon.org

      Language: English - Date: 2013-02-27 15:26:40
      98

      PDF Document

      Add to Reading List

      Source URL: keccak.noekeon.org

      Language: English - Date: 2013-02-27 15:26:40