<--- Back to Details
First PageDocument Content
Keccak / Joan Daemen / SHA-2 / BLAKE / Skein / JH / RadioGatún / NIST hash function competition / Cryptographic hash functions / Cryptography
Date: 2012-10-02 07:45:18
Keccak
Joan Daemen
SHA-2
BLAKE
Skein
JH
RadioGatún
NIST hash function competition
Cryptographic hash functions
Cryptography

SHA-3 Selection Announcement

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 23,17 KB

Share Document on Facebook

Similar Documents

Cryptanalysis of Daniel J. Bernstein and Tanja Lange Skein with full 72 rounds

DocID: 1vqOc - View Document

Shawl A Fall In Love To make it you will need : 1 skein of Mohair Magic Glittz colors Copper Gold Brown Camel Cream Circular needles with 80cm cable

DocID: 1v91X - View Document

HOW TO MAKE ROPE CHROMOSOMES (Telomeres) You will need: Polyester rope- one skein Electrical tape in red, yellow and blue, and black (1/2” Wide). This usually comes packaged together. “DYMO” 3/8”x9.8’ black tap

DocID: 1upDR - View Document

High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof

DocID: 1tqr0 - View Document

The Skein Hash Function Family Version 1.3 — 1 Oct 2010 Niels Ferguson Stefan Lucks Bruce Schneier

DocID: 1tn3m - View Document