Back to Results
First PageMeta Content
Hashing / NIST hash function competition / Message authentication codes / MD6 / Collision resistance / HMAC / Preimage attack / Hash function / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions


The MD6 hash function A proposal to NIST for SHA-3 Ronald L. Rivest
Add to Reading List

Document Date: 2008-10-27 11:58:57


Open Document

File Size: 1,43 MB

Share Result on Facebook

City

Blockcipher / Permutation / /

Company

GPU / Microsoft / Artificial Intelligence Laboratory / /

/

Event

Reorganization / /

Facility

Artificial Intelligence Laboratory Massachusetts Institute of Technology Cambridge / Microsoft Visual Studio / /

IndustryTerm

computer-aided search / parallel processors / randomized hashing applications / /

Organization

E6850 Core Duo / ASIC / Massachusetts Institute of Technology / Institute of Technology Cambridge / /

Person

Eran Tromer Yiqun Lisa Yin / Jim Sukha Drew Sutherland Eran / Benjamin Agre Daniel V / Asif Khan Jayant Krishnamurthy Yuncheng / Daniel V. Bailey / V. Bailey Christopher Crutchfield Yevgeniy Dodis Kermin / Elliott Fleming Asif Khan Jayant / Lin Leo Reyzin Emily Shen Jim / Drew Sutherland Eran Tromer Yiqun / /

/

ProgrammingLanguage

CILK / /

Technology

encryption / FPGA / ASIC / Duo processor / 64-bit processors / /

URL

http /

SocialTag