SWIFFT

Results: 17



#Item
1Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

Add to Reading List

Source URL: thmatters.files.wordpress.com

Language: English - Date: 2015-09-29 10:45:40
2Guidelines for managing the endangered Growling Grass Frog in urbanising landscapes Geoffrey Heard, Michael Scroggie and Nick Clemann 2010

Guidelines for managing the endangered Growling Grass Frog in urbanising landscapes Geoffrey Heard, Michael Scroggie and Nick Clemann 2010

Add to Reading List

Source URL: www.swifft.net.au

Language: English - Date: 2015-08-13 04:03:17
    3SWIFFT: A Modest Proposal for FFT Hashing Vadim Lyubashevsky1, Daniele Micciancio1 , Chris Peikert2, , and Alon Rosen3 1  University of California at San Diego

    SWIFFT: A Modest Proposal for FFT Hashing Vadim Lyubashevsky1, Daniele Micciancio1 , Chris Peikert2, , and Alon Rosen3 1 University of California at San Diego

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2010-09-13 15:39:59
      4Lattice-based Cryptography Daniele Micciancio∗ Oded Regev†  July 22, 2008

      Lattice-based Cryptography Daniele Micciancio∗ Oded Regev† July 22, 2008

      Add to Reading List

      Source URL: www.cims.nyu.edu

      Language: English - Date: 2008-07-22 12:40:02
      5Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

      Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2006-12-04 19:34:48
      6X-Sieve: CMU Sieve 2.2   From: Joan DAEMEN <joan.daemen@st.com> To: <hash-function@nist.gov>

      X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-06-20 09:10:52
      7X-Sieve: CMU Sieve 2.2 From: To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo" title="X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo" class="img-responsive img-polaroid">

      X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-06-20 11:02:04
      8X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi <a-yamagi@ipa.go.jp> User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

      X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-06-20 08:08:26
      9Provably Secure FFT Hashing

      Provably Secure FFT Hashing

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-06-20 09:50:36
      10Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

      Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-06-20 10:58:50