SHA-2

Results: 893



#Item
821NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
822SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-05-26 16:47:31
823The Random Number Generator Validation System (RNGVS) January 31, 2005

The Random Number Generator Validation System (RNGVS) January 31, 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
82455 (2) • May 2006: 443–445  Marhold • IAPT/IOPB Chromosome Data 1

55 (2) • May 2006: 443–445 Marhold • IAPT/IOPB Chromosome Data 1

Add to Reading List

Source URL: www.iopb.org

Language: English - Date: 2007-07-30 05:02:23
825The Hitchhiker's Guide   to the SHA-3 Competition

The Hitchhiker's Guide to the SHA-3 Competition

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2012-07-04 01:21:00
826Finding Collisions in the Full SHA-1 Xiaoyun Wang1, , Yiqun Lisa Yin2 , and Hongbo Yu3 1

Finding Collisions in the Full SHA-1 Xiaoyun Wang1, , Yiqun Lisa Yin2 , and Hongbo Yu3 1

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2008-01-14 02:29:28
827Collisions and Near-Collisions for Reduced-Round Tiger John Kelsey1 , Stefan Lucks2

Collisions and Near-Collisions for Reduced-Round Tiger John Kelsey1 , Stefan Lucks2

Add to Reading List

Source URL: th.informatik.uni-mannheim.de

Language: English - Date: 2006-03-09 11:16:09
828Further progress in hashing cryptanalysis∗ Arjen K. Lenstra Lucent Technologies, Bell Laboratories

Further progress in hashing cryptanalysis∗ Arjen K. Lenstra Lucent Technologies, Bell Laboratories

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
829Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
830Security Proofs for the MD6 Hash Function Mode of Operation by

Security Proofs for the MD6 Hash Function Mode of Operation by

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-11-05 16:27:34