Back to Results
First PageMeta Content
NIST hash function competition / SHA-2 / Advanced Encryption Standard process / SHA-1 / Secure Hash Standard / Hash function / SANDstorm hash / Cryptographic hash functions / Error detection and correction / Cryptography


What hash functions were based on block ciphers
Add to Reading List

Document Date: 2012-06-20 11:10:16


Open Document

File Size: 38,58 KB

Share Result on Facebook

City

Rome / /

Company

the AES / /

/

IndustryTerm

candidate algorithms / finalist algorithms / /

Person

Tentative Timeline / /

Position

Secretary of Commerce for signature / Governor / /

Technology

Encryption / finalist algorithms / 15 algorithms / candidate algorithms / 5 candidate algorithms / 15 candidate algorithms / /

SocialTag