<--- Back to Details
First PageDocument Content
Advanced Encryption Standard / Tiny Encryption Algorithm / Differential cryptanalysis / Grøstl / Crypt / Collision attack / Threefish / Cryptography / Cryptographic hash functions / NIST hash function competition
Date: 2012-05-30 12:26:50
Advanced Encryption Standard
Tiny Encryption Algorithm
Differential cryptanalysis
Grøstl
Crypt
Collision attack
Threefish
Cryptography
Cryptographic hash functions
NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 75,64 KB

Share Document on Facebook

Similar Documents

IMPROVED ANALYSIS OF THREEFISH Jean-Philippe Aumasson, Willi Meier, Raphael Phan 1/5 THREEFISH

DocID: 1mQVQ - View Document

Mixing / Mercy / Rectangular function / Cryptography / Threefish / Advantage

Optimally Secure Tweakable Blockciphers Bart Mennink Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and iMinds, Belgium Abstract. We consider the generic design of a tweakable blockci

DocID: 18kOQ - View Document

Skein / Threefish / Adder / Field-programmable gate array / Cryptographic hash function / Xilinx / Advanced Encryption Standard / ICE / Rotational cryptanalysis / Cryptography / Block ciphers / NIST hash function competition

Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction

DocID: 13Fz9 - View Document

Threefish / Rotational cryptanalysis / Cryptographic hash function / Block cipher / Hash function / Cryptanalysis / Cryptography / NIST hash function competition / Skein

The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

DocID: 13tZt - View Document

NIST hash function competition / Hash function / Rotational cryptanalysis / Cryptanalysis / Threefish / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010

DocID: XOue - View Document