SWIFFT

Results: 17



#Item
11First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
12Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-02-10 05:35:28
13SWIFFT: A Modest Proposal for FFT Hashing Vadim Lyubashevsky1 , Daniele Micciancio1 , Chris Peikert2, , and Alon Rosen3 1

SWIFFT: A Modest Proposal for FFT Hashing Vadim Lyubashevsky1 , Daniele Micciancio1 , Chris Peikert2, , and Alon Rosen3 1

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2009-08-17 12:04:34
14

PDF Document

Add to Reading List

Source URL: www.math.uni-bonn.de

Language: English - Date: 2010-06-11 10:49:47
15

PDF Document

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2008-10-30 09:32:13
16

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:32:23
17

PDF Document

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2008-02-21 04:10:07