<--- Back to Details
First PageDocument Content
Eli Biham / NESSIE / Symmetric-key algorithm / Serpent / Cryptographic hash function / Boomerang attack / Advanced Encryption Standard / Cryptanalysis / KASUMI / Cryptography / Block ciphers / SHACAL
Date: 2012-06-20 08:23:24
Eli Biham
NESSIE
Symmetric-key algorithm
Serpent
Cryptographic hash function
Boomerang attack
Advanced Encryption Standard
Cryptanalysis
KASUMI
Cryptography
Block ciphers
SHACAL

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 19,92 KB

Share Document on Facebook

Similar Documents

University of Illinois  Healthcare Info Sessions: Questions & Answers The following questions were asked during three “town hall” Healthcare Information Sessions, as well as submitted via email to University Human Re

University of Illinois Healthcare Info Sessions: Questions & Answers The following questions were asked during three “town hall” Healthcare Information Sessions, as well as submitted via email to University Human Re

DocID: 1ts1T - View Document

Reliance Standard Life Insurance Company: Basic Essential Coverage Plan Summary of Benefits and Coverage: What this Plan Covers & What it Costs Coverage Period: Coverage for: Employees & Covered Dependen

Reliance Standard Life Insurance Company: Basic Essential Coverage Plan Summary of Benefits and Coverage: What this Plan Covers & What it Costs Coverage Period: Coverage for: Employees & Covered Dependen

DocID: 1t7Cu - View Document

Statement of SURS Annuity Status

Statement of SURS Annuity Status

DocID: 1t62U - View Document

Microsoft Word - SOEEA_Reporting_Policy_APCS_100608.doc

Microsoft Word - SOEEA_Reporting_Policy_APCS_100608.doc

DocID: 1t5xI - View Document

RSL Life Status Changes Event Category Qualifying Event

RSL Life Status Changes Event Category Qualifying Event

DocID: 1sWJt - View Document