<--- Back to Details
First PageDocument Content
Cryptographic hash functions / Hash function / Advanced Encryption Standard / HMAC / Crypt / Algorithm / ZPAQ / HC-256 / Cryptography / Hashing / Error detection and correction
Date: 2008-11-04 08:21:38
Cryptographic hash functions
Hash function
Advanced Encryption Standard
HMAC
Crypt
Algorithm
ZPAQ
HC-256
Cryptography
Hashing
Error detection and correction

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Download Document from Source Website

File Size: 380,50 KB

Share Document on Facebook

Similar Documents

Motivation Introduction Fault Analysis on HC-256

DocID: 1l1Fp - View Document

HC-256 / Q / Stream ciphers / Advanced Encryption Standard / Py

Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ?

DocID: 1aqfW - View Document

SOSEMANUK / Trivium / Rabbit / Grain / HC-256 / MICKEY / CyaSSL / LEX / Computing / Stream ciphers / Salsa20 / ESTREAM

ICTECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information and Communication Technologies

DocID: 12RUq - View Document

Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of AsiacryptXuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

DocID: 12OXX - View Document

Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

DocID: S2OL - View Document