SHA-3

Results: 359



#Item
1Computer architecture / Cryptography / Computing / NIST hash function competition / Instruction set architectures / Cryptographic hash functions / Assembly languages / Grstl / ARM architecture / SHA-2 / 64-bit computing / Addressing mode

SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2013-02-27 00:13:54
2Cryptography / Cryptographic hash functions / NIST hash function competition / Flynn's taxonomy / Parallel computing / SIMD / SHA-3 / Hash function / Block cipher / MerkleDamgrd construction / One-way compression function

SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter: Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
3

LABYRINTHS Labyrinths are found in many cultures dating back as much as 3,500 years. Unlike a maze, the labyrinth is unicursal, having a single path leading to the center with no loops, cul-de-sacs or forks. They all sha

Add to Reading List

Source URL: www.paxworks.com

Language: English - Date: 2009-01-08 13:05:35
    4

    2018 年 6 月 6 日 報道資料 110 万のお尻から厳選した「美尻カレンダー」9 年分からさらに ビーチに映える 3 つの“神尻”を選抜「美尻うちわ」新発売!

    Add to Reading List

    Source URL: www.hakusui-sha.co.jp

    Language: Japanese - Date: 2018-06-04 04:36:40
      5

      SHA-3 Conference, August 2010, Building Power Analysis Resistant Implementations of Keccak

      Add to Reading List

      Source URL: keccak.team

      Language: English - Date: 2017-08-22 12:54:46
        6

        Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl Kimmo Järvinen Department of Information and Computer Science Aalto University, School of Science and Technology

        Add to Reading List

        Source URL: users.ics.aalto.fi

        Language: English - Date: 2010-08-15 15:20:50
          7

          Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits ˇ Petr Svenda, Martin Ukrop, and Vashek Maty´aˇs

          Add to Reading List

          Source URL: crocs.fi.muni.cz

          Language: English - Date: 2014-09-16 13:25:20
            8

            Comments Received in Response to: Request for Comments on Draft FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

            Add to Reading List

            Source URL: csrc.nist.gov

            - Date: 2017-02-24 15:05:30
              9

              (ARCHIVED as of AUGUST 5, 2015): DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2017-03-01 15:35:52
                10

                Freestart collision for full SHA-1 Marc Stevens1? , Pierre Karpman2,3?? , and Thomas Peyrin3? ? ? 1 Centrum Wiskunde & Informatica, The Netherlands 2

                Add to Reading List

                Source URL: marc-stevens.nl

                - Date: 2017-08-13 07:48:58
                  UPDATE