Back to Results
First PageMeta Content
NIST hash function competition / Hashing / SHA-2 / MD6 / HMAC / Preimage attack / CubeHash / SHA-1 / NaSHA / Error detection and correction / Cryptographic hash functions / Cryptography


Document Date: 2009-07-15 19:17:03


Open Document

Share Result on Facebook

Company

Intel / Wilson / /

/

Facility

Computer Science University of Illinois at Chicago Chicago / /

IndustryTerm

collision search attack / occasional applications / real-world cryptographic applications / /

Organization

National Science Foundation / University of Illinois at Chicago / Daniel J. Bernstein Department / /

Person

Daniel J. Bernstein / /

/

Position

author / /

Technology

alternative algorithms / submitted algorithm / 2 Duo Processor / /

SocialTag