<--- Back to Details
First PageDocument Content
Cryptography / Keccak / Advanced Encryption Standard / JH / SHA-2 / 64-bit / Grøstl / Addressing mode / Bitwise operation / NIST hash function competition / Computer architecture / Computing
Date: 2011-12-09 23:11:17
Cryptography
Keccak
Advanced Encryption Standard
JH
SHA-2
64-bit
Grøstl
Addressing mode
Bitwise operation
NIST hash function competition
Computer architecture
Computing

SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 300,38 KB

Share Document on Facebook

Similar Documents

The Advanced Encryption Standard  Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

DocID: 1unET - View Document

The Advanced Encryption Standard  Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

The Advanced Encryption Standard Successor of DES DES considered insecure; 3DES considered too slow. NIST competition insubmissions 1998; 5 finalists 1999

DocID: 1ulfR - View Document

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

DocID: 1rolT - View Document

Crypto Device Drivers ReleaseJuly 28, 2016  CONTENTS

Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

DocID: 1rlUX - View Document

Microsoft PowerPoint - HPTS_2009.ppt

Microsoft PowerPoint - HPTS_2009.ppt

DocID: 1qX2H - View Document