<--- Back to Details
First PageDocument Content
NIST hash function competition / Skein / Hashing / Threefish / Rotational cryptanalysis / SHA-2 / SHA-1 / Feistel cipher / Stefan Lucks / Cryptography / Error detection and correction / Cryptographic hash functions
Date: 2012-03-27 04:10:33
NIST hash function competition
Skein
Hashing
Threefish
Rotational cryptanalysis
SHA-2
SHA-1
Feistel cipher
Stefan Lucks
Cryptography
Error detection and correction
Cryptographic hash functions

Add to Reading List

Source URL: www.skein-hash.info

Download Document from Source Website

File Size: 468,13 KB

Share Document on Facebook

Similar Documents

Rotational Cryptanalysis of ARX Dmitry Khovratovich and Ivica Nikoli“c University of Luxembourg , Abstract. In this paper we analyze the security of systems based on

DocID: 1nkVg - View Document

Skein / Threefish / Adder / Field-programmable gate array / Cryptographic hash function / Xilinx / Advanced Encryption Standard / ICE / Rotational cryptanalysis / Cryptography / Block ciphers / NIST hash function competition

Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction

DocID: 13Fz9 - View Document

Threefish / Rotational cryptanalysis / Cryptographic hash function / Block cipher / Hash function / Cryptanalysis / Cryptography / NIST hash function competition / Skein

The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

DocID: 13tZt - View Document

NIST hash function competition / Hash function / Rotational cryptanalysis / Cryptanalysis / Threefish / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010

DocID: XOue - View Document

RC5 / Rotational symmetry / Advanced Encryption Standard / Rotation / Linear cryptanalysis / MARS / Madryga / Cryptography / Block ciphers / RC6

On Di erential Properties of Data-Dependent Rotations and Their Use in MARS and RC6

DocID: 699F - View Document