<--- Back to Details
First PageDocument Content
Cryptography / NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Joan Daemen / Gilles Van Assche / Differential cryptanalysis / Data Encryption Standard
Date: 2013-02-27 15:26:40
Cryptography
NIST hash function competition
SHA-3
Cryptographic hash functions
Sponge function
Joan Daemen
Gilles Van Assche
Differential cryptanalysis
Data Encryption Standard

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Download Document from Source Website

File Size: 1,40 MB

Share Document on Facebook

Similar Documents

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

DocID: 1sFzA - View Document

Forestry The region’s forests function as habitat for a panoply of remarkable species, a sponge that sustains watersheds, and a resource for industry and recreation. At the same time, our forests confront the spread of

Forestry The region’s forests function as habitat for a panoply of remarkable species, a sponge that sustains watersheds, and a resource for industry and recreation. At the same time, our forests confront the spread of

DocID: 1sscp - View Document

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

DocID: 1qZv0 - View Document

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

DocID: 1pRqy - View Document

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

DocID: 1pqnF - View Document