SHA-3

Results: 359



#Item
31NIST hash function competition / SHA-3 / Cryptographic hash functions / Hashing / Sponge function / Cryptography / Gilles Van Assche

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
32Vowel letters / Z / Yo / Resh / Y / Sha / P / V

3. SOUTHERN STYLE SWAP - by UCAOIMHU, Somerville MA In this puzzle, (a) Half of the South answers must have one or two letters changed before entry (one of the words thus formed is NI2); all these changes involve the sam

Add to Reading List

Source URL: www.math.uchicago.edu

Language: English - Date: 2011-07-11 16:52:19
33Cross-platform software / Computing platforms / GStreamer / OpenMAX / Linux / FreeType / Java / SHA-3 / Package manager / Adobe Flash

net2o — Reinventing the Internet I’ve a dream: A peer–to–peer network, where services like search engines or social networks aren’t offered by big companies, who in turn need to make money by selling the priva

Add to Reading List

Source URL: fossil.net2o.de

Language: English
34Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / Block cipher mode of operation / SHA-1 / Hash-based message authentication code / Cryptographic Module Testing Laboratory / FIPS 140-3

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
35Cryptographic hash functions / SHA-2 / SHA-1 / Radio-frequency identification / Crypt / Hash function / Secure Hash Algorithm / VEST / SHA-3

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-21 05:29:13
36

A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha

Add to Reading List

Source URL: webdocs.cs.ualberta.ca

Language: English - Date: 2009-10-06 18:16:29
    37Cryptography / Cryptographic hash functions / NIST hash function competition / SHA-3 / Sponge function / Password / Crypt / Hash function / Exclusive or / Key derivation function / Lyra2

    Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-14 07:18:05
    38

    SHA-3: should we care? Jean-Philippe Aumasson 2005 SHA-1

    Add to Reading List

    Source URL: 131002.net

    - Date: 2012-11-03 16:39:32
      39

      BLAKE SIMD past, present, future Jean-Philippe Aumasson, NAGRA Joint work with Samuel Neves, Uni Coimbra SHA-3 \in

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:47:04
        UPDATE