![Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction](https://www.pdfsearch.io/img/3726d55212c9002eb971a32e994e68a2.jpg) Date: 2013-02-27 15:26:42Hashing Search algorithms NIST hash function competition Keccak Hash function Crypt VEST GOST Tabulation hashing Cryptography Cryptographic hash functions Error detection and correction | | Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) andAdd to Reading ListSource URL: keccak.noekeon.orgDownload Document from Source Website File Size: 190,95 KBShare Document on Facebook
|