First Page | Document Content | |
---|---|---|
Date: 2013-02-27 15:26:40Cryptography Cryptographic hash functions NIST hash function competition Hashing SHA-3 Sponge function Gilles Van Assche Joan Daemen Hash-based message authentication code Data Encryption Standard Hash function Random oracle | Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2Add to Reading ListSource URL: keccak.noekeon.orgDownload Document from Source WebsiteFile Size: 1,27 MBShare Document on Facebook |
Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2DocID: 1sFzA - View Document | |
Forestry The region’s forests function as habitat for a panoply of remarkable species, a sponge that sustains watersheds, and a resource for industry and recreation. At the same time, our forests confront the spread ofDocID: 1sscp - View Document | |
Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2DocID: 1qZv0 - View Document | |
Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2DocID: 1pRqy - View Document | |
Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXPDocID: 1pqnF - View Document |