Rotational cryptanalysis

Results: 9



#Item
1Rotational Cryptanalysis of ARX Dmitry Khovratovich and Ivica Nikoli´c University of Luxembourg ,   Abstract. In this paper we analyze the security of systems based on

Rotational Cryptanalysis of ARX Dmitry Khovratovich and Ivica Nikoli´c University of Luxembourg , Abstract. In this paper we analyze the security of systems based on

Add to Reading List

Source URL: www.cryptolux.org

Language: English - Date: 2013-09-17 06:26:54
    2Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction

    Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:32
    3The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

    The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:32
    4A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010

    A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010

    Add to Reading List

    Source URL: people.item.ntnu.no

    Language: English - Date: 2010-11-15 08:00:24
    5On Dierential Properties of Data-Dependent Rotations and Their Use in MARS and RC6

    On Di erential Properties of Data-Dependent Rotations and Their Use in MARS and RC6

    Add to Reading List

    Source URL: www.crypto-world.com

    Language: English - Date: 2011-04-01 07:20:46
    6Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3

    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-02-07 10:17:20
    7

    PDF Document

    Add to Reading List

    Source URL: www.skein-hash.info

    Language: English - Date: 2012-03-27 04:10:33
    8

    PDF Document

    Add to Reading List

    Source URL: www.skein-hash.info

    Language: English - Date: 2012-03-27 04:09:19
    9

    PDF Document

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-05-30 13:40:08