SANDstorm hash

Results: 4



#Item
1

The SANDstorm Hash Mark Torgerson and Richard Schroeppel Tim Draelos, Nathan Dautenhahn, Sean Malone, Andrea Walker, Michael Collins, Hilarie Orman* Cryptography and Information Systems Surety Department Sandia National

Add to Reading List

Source URL: www.seantmalone.com

- Date: 2012-12-15 16:15:09
    2NIST hash function competition / SHA-2 / Advanced Encryption Standard process / SHA-1 / Secure Hash Standard / Hash function / SANDstorm hash / Cryptographic hash functions / Error detection and correction / Cryptography

    What hash functions were based on block ciphers

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-20 11:10:16
    3Cryptography / SHA-2 / SANDstorm hash / SHA-1 / MD6 / NaSHA / Keccak / Elliptic curve only hash / Collision attack / Error detection and correction / Cryptographic hash functions / NIST hash function competition

    PDF Document

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-07 14:18:38
    4Cryptography / SHA-1 / SHA-2 / NaSHA / SANDstorm hash / Elliptic curve only hash / Keccak / Collision attack / Preimage attack / Error detection and correction / NIST hash function competition / Cryptographic hash functions

    PDF Document

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2009-04-19 10:02:27
    UPDATE