<--- Back to Details
First PageDocument Content
JH / Advanced Encryption Standard / Q / ICE / Cryptographic hash functions / Serpent / Grøstl / One-way compression function / Cryptography / NIST hash function competition / Block cipher
Date: 2012-07-05 12:19:19
JH
Advanced Encryption Standard
Q
ICE
Cryptographic hash functions
Serpent
Grøstl
One-way compression function
Cryptography
NIST hash function competition
Block cipher

The Hash Function JH 1

Add to Reading List

Source URL: perso.uclouvain.be

Download Document from Source Website

File Size: 521,88 KB

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic hash functions / One-way compression function / Block cipher / SHA-1 / Hash function

An abridged version, reference [2], appears as Advances in Cryptology – CRYPTO ’02, Lecture Notes in Computer Science, Vol. ????, M. Yung, ed., Springer-Verlag. This is the full version. Black-Box Analysis of the Blo

DocID: 1qpw6 - View Document

Cryptography / Cryptographic hash functions / Information retrieval / Search algorithms / Hashing / Permutations / Error detection and correction / Hash function / Advantage / Birthday attack / Parity of a permutation / One-way compression function

An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

DocID: 1q3qz - View Document

Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

DocID: 1llOc - View Document

Cryptography / Advantage / Block cipher / Pseudorandom permutation / Feistel cipher / Cardinal number / One-way compression function / Index of cryptography articles

Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia

DocID: 1kVR0 - View Document