![Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing](https://www.pdfsearch.io/img/2e8d06643e6a32236886c565f8ddd9a1.jpg)
| Document Date: 2015-04-22 06:51:37 Open Document File Size: 378,98 KBShare Result on Facebook
City Lausanne / / Company AES / Intel / / IndustryTerm shortest possible wallclock time using special purpose hardware / unicorn protocol / computing / cryptographic applications / software results / conceivable software / software package / paper potential solutions / chosen / / Organization ASIC / g. / / Person Benjamin Wesolowski / / PoliticalEvent democratic voting / / Technology block cipher / cryptography / ASIC / two-round protocol / unicorn protocol / digital camera / resulting protocol / /
SocialTag |