SHA-3

Results: 359



#Item
1SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2013-02-27 00:13:54
2SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter:  Ga¨etan Leurent

SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter: Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
3LABYRINTHS Labyrinths are found in many cultures dating back as much as 3,500 years. Unlike a maze, the labyrinth is unicursal, having a single path leading to the center with no loops, cul-de-sacs or forks. They all sha

LABYRINTHS Labyrinths are found in many cultures dating back as much as 3,500 years. Unlike a maze, the labyrinth is unicursal, having a single path leading to the center with no loops, cul-de-sacs or forks. They all sha

Add to Reading List

Source URL: www.paxworks.com

Language: English - Date: 2009-01-08 13:05:35
    42018 年 6 月 6 日  報道資料 110 万のお尻から厳選した「美尻カレンダー」9 年分からさらに ビーチに映える 3 つの“神尻”を選抜「美尻うちわ」新発売!

    2018 年 6 月 6 日 報道資料 110 万のお尻から厳選した「美尻カレンダー」9 年分からさらに ビーチに映える 3 つの“神尻”を選抜「美尻うちわ」新発売!

    Add to Reading List

    Source URL: www.hakusui-sha.co.jp

    Language: Japanese - Date: 2018-06-04 04:36:40
      5SHA-3 Conference, August 2010, Building Power Analysis Resistant Implementations of Keccak

      SHA-3 Conference, August 2010, Building Power Analysis Resistant Implementations of Keccak

      Add to Reading List

      Source URL: keccak.team

      Language: English - Date: 2017-08-22 12:54:46
        6Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl Kimmo Järvinen Department of Information and Computer Science Aalto University, School of Science and Technology

        Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl Kimmo Järvinen Department of Information and Computer Science Aalto University, School of Science and Technology

        Add to Reading List

        Source URL: users.ics.aalto.fi

        Language: English - Date: 2010-08-15 15:20:50
          7Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits ˇ Petr Svenda, Martin Ukrop, and Vashek Maty´aˇs

          Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits ˇ Petr Svenda, Martin Ukrop, and Vashek Maty´aˇs

          Add to Reading List

          Source URL: crocs.fi.muni.cz

          Language: English - Date: 2014-09-16 13:25:20
            8Comments Received in Response to:  Request for Comments on Draft FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

            Comments Received in Response to: Request for Comments on Draft FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

            Add to Reading List

            Source URL: csrc.nist.gov

            - Date: 2017-02-24 15:05:30
              9(ARCHIVED as of AUGUST 5, 2015): DRAFT FIPS 202, SHA-3 Standard:  Permutation-Based Hash and Extendable-Output Functions

              (ARCHIVED as of AUGUST 5, 2015): DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2017-03-01 15:35:52
                10Freestart collision for full SHA-1 Marc Stevens1? , Pierre Karpman2,3?? , and Thomas Peyrin3? ? ? 1 Centrum Wiskunde & Informatica, The Netherlands 2

                Freestart collision for full SHA-1 Marc Stevens1? , Pierre Karpman2,3?? , and Thomas Peyrin3? ? ? 1 Centrum Wiskunde & Informatica, The Netherlands 2

                Add to Reading List

                Source URL: marc-stevens.nl

                - Date: 2017-08-13 07:48:58