First Page | Document Content | |
---|---|---|
Date: 2013-02-27 15:26:40Cryptography Cryptographic hash functions NIST hash function competition Hashing SHA-3 Sponge function Gilles Van Assche Joan Daemen Hash-based message authentication code Data Encryption Standard Hash function Random oracle | Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2Add to Reading ListSource URL: keccak.noekeon.orgDownload Document from Source WebsiteFile Size: 1,27 MBShare Document on Facebook |
Differential propagation analysis of K Joan Daemen and Gilles Van Assche STMicroelectronics Abstract. In this paper we introduce new concepts that help read and understand low-weight differential trails in KDocID: 1usdg - View Document | |
Joan Daemen, Michaël Peeters, Gilles Van Assche, Vincent Rijmen The NOEKEONDocID: 1tS9w - View Document | |
Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2DocID: 1qZv0 - View Document | |
Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2DocID: 1pRqy - View Document | |
Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXPDocID: 1pqnF - View Document |