Back to Results
First PageMeta Content
Computing / SHA-2 / Hash function / Endianness / Preimage attack / Bit array / Hexadecimal / MD5 / GOST / Error detection and correction / Cryptography / Cryptographic hash functions


Cryptographic Hash Function B LUE M IDNIGHT W ISH Norwegian University of Science and Technology Trondheim, Norway
Add to Reading List

Document Date: 2009-09-10 07:24:20


Open Document

File Size: 1,29 MB

Share Result on Facebook

City

Trondheim / /

Company

Intel / /

Country

Norway / Czech Republic / /

/

Facility

National Institute of Standards and Technology / The Norwegian University of Science / Cryptographic Hash Function B LUE M IDNIGHT W ISH Norwegian University of Science / Norwegian University of Science / /

/

IndustryTerm

hash algorithm / /

Organization

National Institute of Standards and Technology / ISH Norwegian University of Science and Technology Trondheim / Faculty of Information Technology / Mathematics and Electrical Engineering / Department of Telematics / Centre for Quantifiable Quality of Service / Centre of Excellence / Norwegian University of Science and Technology / /

Person

Danilo Gligoroski / Mohamed El-Hadedy / Johan Knapskog Mohamed El-Hadedy / Mohamed El-Hadedy Jørn / Danilo Gligoroski Vlastimil Klima Svein / Johan Knapskog / /

/

Position

consultant / General / /

ProgrammingLanguage

C++ / /

Technology

submitted algorithm / Information Technology / 1 Algorithm / block cipher / 8-bit processors / ISH hash algorithm / 1 1 Algorithm / little-endian / /

SocialTag