Back to Results
First PageMeta Content
Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction


Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and
Add to Reading List

Document Date: 2013-02-27 15:26:42


Open Document

File Size: 190,95 KB

Share Result on Facebook

Company

RSA Laboratories / /

Currency

pence / /

IndustryTerm

cryptographic hash algorithm / 32bit processor / input pre-processing / input pre-processing step / candidate algorithms / protocol / energy / /

Person

Stefan Lucks / Ron Rivest / Guido Bertoni / Michaƫl Peeters / Joan Daemen / /

Position

designer / /

ProgrammingLanguage

K / /

ProvinceOrState

Nova Scotia / /

PublishedMedium

Cryptology ePrint Archive / Lecture Notes in Computer Science / /

Technology

candidate algorithms / cryptography / RAM / So ware Encryption / cryptographic hash algorithm / public key / 32bit processor / API / /

URL

http /

SocialTag