CubeHash

Results: 10



#Item
1

High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2009-11-11 12:35:56
    2Cryptography / CubeHash / Cryptographic hash function / Crypt / Hash function / Stream cipher / PBKDF2 / Scrypt / Salt / Password / Bcrypt / Key derivation function

    Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/

    Add to Reading List

    Source URL: password-hashing.net

    Language: English
    3

    Improved Linear Differential Attacks on CubeHash Shahram Khazaei1 Simon Knellwolf2 Deian Stefan3

    Add to Reading List

    Source URL: 2010.africacrypt.com

    Language: English - Date: 2010-05-22 21:17:00
      4SHA-2 / Daniel J. Bernstein / Mathematics / Computing / NIST hash function competition / Cryptographic hash functions / CubeHash

      Microsoft Office Outlook - Memo Style

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-06-07 13:40:14
      5NIST hash function competition / Hashing / Vlastimil Klíma / Preimage attack / Crypt / Hash function / CubeHash / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

      Microsoft Office Outlook - Memo Style

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-05-30 12:14:28
      6Cryptographic hash functions / SHA-1 / Keccak / Skein / BLAKE / Secure Hash Standard / CubeHash / Vlastimil Klíma / SIMD / NIST hash function competition / Error detection and correction / Cryptography

      NISTIR 7764, Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-03-01 16:20:57
      7Cryptography / Atmel AVR / Padding / Computing / Electronic engineering / NIST hash function competition / CubeHash / Microcontrollers

      PDF Document

      Add to Reading List

      Source URL: cubehash.cr.yp.to

      Language: English - Date: 2008-10-30 10:40:17
      8NIST hash function competition / Hashing / SHA-2 / CubeHash / HMAC / Advanced Encryption Standard / Padding / SHA-1 / Keccak / Error detection and correction / Cryptography / Cryptographic hash functions

      PDF Document

      Add to Reading List

      Source URL: cubehash.cr.yp.to

      Language: English - Date: 2009-09-14 18:24:21
      9Cryptographic hash functions / SHA-1 / Keccak / Skein / BLAKE / Secure Hash Standard / CubeHash / Vlastimil Klíma / SIMD / NIST hash function competition / Error detection and correction / Cryptography

      PDF Document

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-05-30 12:35:44
      10NIST hash function competition / Hashing / SHA-2 / MD6 / HMAC / Preimage attack / CubeHash / SHA-1 / NaSHA / Error detection and correction / Cryptographic hash functions / Cryptography

      PDF Document

      Add to Reading List

      Source URL: cubehash.cr.yp.to

      Language: English - Date: 2009-07-15 19:17:03
      UPDATE