<--- Back to Details
First PageDocument Content
Eli Biham / NESSIE / Symmetric-key algorithm / Serpent / Cryptographic hash function / Boomerang attack / Advanced Encryption Standard / Cryptanalysis / KASUMI / Cryptography / Block ciphers / SHACAL
Date: 2012-06-20 08:23:24
Eli Biham
NESSIE
Symmetric-key algorithm
Serpent
Cryptographic hash function
Boomerang attack
Advanced Encryption Standard
Cryptanalysis
KASUMI
Cryptography
Block ciphers
SHACAL

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 19,92 KB

Share Document on Facebook

Similar Documents

Recent movements on geothermal development in Japan Kasumi Yasukawa National Institute of Advanced Industrial Science and Technology (AIST)

DocID: 1nvpb - View Document

The Peony Lantern By Frances Watts Book Summary: When Kasumi leaves her remote village for the teeming city of Edo, her life is transformed. As a lady-in-waiting in a samurai mansion she

DocID: 1lD3t - View Document

Article De novo discovery of a tissue-specific gene regulatory module in a chordate David S. Johnson,1 Qing Zhou,2 Kasumi Yagi,3 Nori Satoh,3 Wing Wong,2 and Arend Sidow1,4

DocID: 1lkzC - View Document

PDF Document

DocID: 1klqc - View Document

PDF Document

DocID: 1jUAG - View Document