Back to Results
First PageMeta Content
Hashing / SHA-2 / SHA-1 / Collision attack / MD4 / HMAC / RadioGatún / Preimage attack / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Error detection and correction


NIST recently held a workshop (Oct
Add to Reading List

Document Date: 2013-05-07 13:08:30


Open Document

File Size: 52,53 KB

Share Result on Facebook

City

Santa Barbara / /

Company

the AES / IBM / Qualcomm Australia / Cryptography Laboratory / NTT DATA Corporation / HP Labs / STMicroelectronics / Microsoft / /

Country

Panama / Germany / /

Facility

Norwegian University of Science / Workshop Report The Second Cryptographic Hash Workshop University of California / Shu-jen Chang Information Technology Laboratory / Weizmann Institute of Science / Graz University of Technology / Israel Institute of Technology / University of London / University of California / University of Fukui / National Institute of Standards and Technology / University of Versailles / Massachusetts Institute of Technology / /

IndustryTerm

hash function applications / attack tools / search trees / search process / automated search / above web site / automatic tools / legacy systems / reasonable security applications / candidate algorithms / /

Organization

University of California / Massachusetts Institute of Technology / University of Versailles / Computer Science Department / Federal Office for Information Security / National Institute of Standards and Technology / Ecole Polytechnique / Israel Institute of Technology / University of London / Norwegian University of Science and Technology / Weizmann Institute of Science / Faculty of Computer Science / Computer Security Division / Cryptography Research and Evaluation Group IT Security Center / Shu-jen Chang Information Technology Laboratory / Katholieke Universiteit Leuven / University of Fukui / Technion / Graz University of Technology / /

Person

Kristin Lauter / Niels Ferguson / Chris Peikert / Adi Shamir / Christian Rechberger / Paul Hoffman / Bart Preneel / Thomas Ristenpart / Elaine Barker / Gilles Van Assche / Danilo Gligoroski / John Kelsey / Stuart Haber / Ron Rivest / Antoine Joux / Bill Burr / Donna Dodson / Philip Hawkes / Makoto Sugita / Werner Schindler / Shoichi Hirose / James Nechvatal / /

Position

manager of the Security Technology Group / independent security consultant / Way Forward / /

ProvinceOrState

Connecticut / California / Massachusetts / /

Technology

candidate algorithms / Information Technology / block cipher / Cryptography / VPN / /

URL

http /

SocialTag