Back to Results
First PageMeta Content
NIST hash function competition / Hashing / Message authentication codes / Keccak / HMAC / Hash function / Crypt / ICE / VEST / Error detection and correction / Cryptography / Cryptographic hash functions


The K SHA-3 submission
Add to Reading List

Document Date: 2013-02-27 15:26:40


Open Document

File Size: 245,35 KB

Share Result on Facebook

Company

STMicroelectronics 2 NXP Semiconductors / /

Currency

pence / /

Event

FDA Phase / /

IndustryTerm

possible applications / input pre-processing step / candidate algorithms / protocol / energy / /

Person

Guido B Joan / Stefan Lucks / Ron Rivest / /

Position

designer / /

Product

SHA-3 / /

ProgrammingLanguage

K / /

Technology

encryption / candidate algorithms / RAM / public key / digital signature / API / stream cipher / /

URL

http /

SocialTag