<--- Back to Details
First PageDocument Content
Advanced Encryption Standard / Tiny Encryption Algorithm / Differential cryptanalysis / Grøstl / Crypt / Collision attack / Threefish / Cryptography / Cryptographic hash functions / NIST hash function competition
Date: 2012-05-30 12:26:50
Advanced Encryption Standard
Tiny Encryption Algorithm
Differential cryptanalysis
Grøstl
Crypt
Collision attack
Threefish
Cryptography
Cryptographic hash functions
NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 75,64 KB

Share Document on Facebook

Similar Documents

Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl Kimmo Järvinen Department of Information and Computer Science Aalto University, School of Science and Technology

DocID: 1umz7 - View Document

High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof

DocID: 1tqr0 - View Document

Silicon Implementation of SHA-3 Finalists: BLAKE, Grøstl, JH, Keccak and Skein Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali and Patrick Schaumont Center for Embedded Systems for

DocID: 1mt6i - View Document

Grøstl – a SHA-3 candidate http://www.groestl.info Praveen Gauravaram1 , Lars R. Knudsen1 , Krystian Matusiewicz1 , Florian Mendel2 , Christian Rechberger2 , Martin Schl¨affer2 , and Søren S. Thomsen1 1

DocID: 1lGXP - View Document