Back to Results
First PageMeta Content
SHA-1 / SHA-2 / Merkle–Damgård construction / Collision attack / Tiger / HMAC / Hash function / Preimage attack / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography


NIST recently held a workshop (Oct
Add to Reading List

Document Date: 2013-05-07 13:02:00


Open Document

File Size: 84,67 KB

Share Result on Facebook

Company

Whirlpool / the AES / IBM / Lucent Technologies' Bell Laboratories / Hitachi Ltd. / Microsoft / PRISM Laboratory / RSA Security / /

Country

Germany / /

Facility

Morris Dworkin Information Technology Laboratory / Korea University / Portland State University / Tsinghua University / Columbia University / University of Seoul / Graz University of Technology / National Institute of Standards and Technology / University of Versailles / University of Skopje / Massachusetts Institute of Technology / /

IndustryTerm

weaker cryptographic algorithms / hash algorithms / immediate solution / above web site / cryptographic protocols / collision search / double hash algorithm / Internet Key Exchange / /

OperatingSystem

Fork / /

Organization

Columbia University / University of Skopje / Korea University / Massachusetts Institute of Technology / University of Versailles / National Institute of Standards and Technology / University of Seoul / Federal Office for Security / Portland State University / Tsinghua University / Institute for Applied Information Processing and Communications / Morris Dworkin Information Technology Laboratory / Katholieke Universiteit Leuven / Technion / Graz University of Technology / /

Person

Georg Illies / Niels Ferguson / Christian Rechberger / Bart Preneel / Michael Szydlo / Danilo Gligoroski / Hirotaka Yoshida / John Kelsey / Ron Rivest / Antoine Joux / Wang / Steve Bellovin / Donna Dodson / Hugo Krawczyk / George Illies / Arjen Lenstra / Steven Bellovin / Lily Chen / Don Johnson / Thomas Shrimpton / James Randall / Morris Dworkin / Chang Dworkin / /

Position

protocol designer / /

ProgrammingLanguage

PostScript / /

ProvinceOrState

Massachusetts / /

Technology

Information Technology / block cipher / S/MIME / double hash algorithm / NIST-approved hash algorithms / weaker cryptographic algorithms / /

URL

http /

SocialTag