1![Rotational Cryptanalysis of ARX Dmitry Khovratovich and Ivica Nikoli´c University of Luxembourg , Abstract. In this paper we analyze the security of systems based on Rotational Cryptanalysis of ARX Dmitry Khovratovich and Ivica Nikoli´c University of Luxembourg , Abstract. In this paper we analyze the security of systems based on](https://www.pdfsearch.io/img/41eb29b210016d1a0668c0678645b6b4.jpg) | Add to Reading ListSource URL: www.cryptolux.orgLanguage: English - Date: 2013-09-17 06:26:54
|
---|
2![Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction](https://www.pdfsearch.io/img/3f03464227e0658bf16b4382f08e7ec6.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:32
|
---|
3![The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm](https://www.pdfsearch.io/img/f2f89ebf3b9a808a3adee30f328578f9.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:32
|
---|
4![A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010 A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010](https://www.pdfsearch.io/img/3776892a1761c8834fbc75bb49edd8c0.jpg) | Add to Reading ListSource URL: people.item.ntnu.noLanguage: English - Date: 2010-11-15 08:00:24
|
---|
5![On Di
erential Properties of Data-Dependent Rotations and Their Use in MARS and RC6 On Di
erential Properties of Data-Dependent Rotations and Their Use in MARS and RC6](https://www.pdfsearch.io/img/07523ecff7f9df3986ab2bb0dca0f7be.jpg) | Add to Reading ListSource URL: www.crypto-world.comLanguage: English - Date: 2011-04-01 07:20:46
|
---|
6![Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3 Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3](https://www.pdfsearch.io/img/eb72f3f6e33b9a7867a25b81ba5e304f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-02-07 10:17:20
|
---|
7![](https://www.pdfsearch.io/img/79a508169ab122ec51c7c7947e7ccf9e.jpg) | Add to Reading ListSource URL: www.skein-hash.infoLanguage: English - Date: 2012-03-27 04:10:33
|
---|
8![](https://www.pdfsearch.io/img/52869307199307cacea52b076fc3f4de.jpg) | Add to Reading ListSource URL: www.skein-hash.infoLanguage: English - Date: 2012-03-27 04:09:19
|
---|
9![](https://www.pdfsearch.io/img/40379e608f106faffd7c0e0e2ec8dc2a.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-05-30 13:40:08
|
---|