Back to Results
First PageMeta Content
SHA-2 / SHA-1 / Preimage attack / Padding / Advanced Encryption Standard / NIST hash function competition / Block cipher / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing


The SHAvite-3 Hash Function Tweaked Version[removed]
Add to Reading List

Document Date: 2009-11-23 10:40:19


Open Document

File Size: 389,82 KB

Share Result on Facebook

City

Haifa / /

Company

7A BD C1 55 54 E AB / 2F 58 9F F3 19 0B E4 AE / Intel / the AES / /

Country

Israel / /

/

Facility

Computer Science Weizmann Institute of Science P.O. Box / /

IndustryTerm

approach takes pre-processing time / on-line part / online phase / successor algorithm / exhaustive search / schedule algorithm / /

Organization

SR MC / Mathematics and Computer Science Weizmann Institute / Ecole Normale Sup´erieure D´epartement d’Informatique / INRIA Faculty of Mathematics / MOD Research and Technology Unit / CNRS / Computer Science Department / Technion / Weizmann Institute of Science / /

Position

first author / Dean / /

ProgrammingLanguage

D / /

Technology

encryption / key schedule algorithm / block cipher / successor algorithm / /

SocialTag