SHA-2

Results: 893



#Item
781Hash function / Collision resistance / MD5 / SHA-1 / Differential cryptanalysis / MD4 / Block cipher / SHA-2 / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

´ n, a belt-and-mill hash function RadioGatu Guido Bertoni, Joan Daemen, Gilles Van Assche STMicroelectronics Micha¨el Peeters

Add to Reading List

Source URL: radiogatun.noekeon.org

Language: English - Date: 2013-02-27 15:27:44
782Hashing / Block ciphers / SHA-1 / SHA-2 / Key size / Key schedule / Symmetric-key algorithm / RC4 / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Stream ciphers

Microsoft PowerPoint - preneel_lightweight_shanghaiv1.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-10-21 10:42:25
783SHA-1 / SHA-2 / MD4 / HMAC / Block cipher / Key size / Py / Data Encryption Standard / Crypt / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - preneel_abudhabiv2.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-12-11 02:59:17
784One-way compression function / MD5 / Preimage attack / SHA-2 / SHA-1 / Merkle–Damgård construction / Collision attack / N-Hash / Birthday attack / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft PowerPoint - preneel_hash_tools_2012v2.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2012-05-31 19:52:41
785Electronic commerce / Key management / Hashing / Key size / SHA-1 / SHA-2 / RSA / Collision attack / NIST hash function competition / Cryptography / Cryptographic hash functions / Public-key cryptography

Microsoft PowerPoint - preneel_closing_isse12v4.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2013-10-24 09:07:43
786Post-quantum cryptography / Hashing / Merkle signature scheme / Hash tree / Digital signature / SHA-2 / RSA / SHA-1 / Hash function / Cryptography / Cryptographic hash functions / Public-key cryptography

2006 IEEE 24th Convention of Electrical and Electronics Engineers in Israel One-Time Signatures Revisited: Practical Fast Signatures Using Fractal Merkle Tree Traversal Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: www.eng.tau.ac.il

Language: English - Date: 2006-11-22 02:16:55
787Cryptographic hash functions / Digital electronics / Field-programmable gate array / Xilinx / Keccak / SHA-2 / Altera / Joint Test Action Group / NIST hash function competition / Electronic engineering / Electronics / Fabless semiconductor companies

SHA-3 Conference, March 2012, Lightweight Implementations of SHA-3 Fialists on FPGAs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:06:14
788Cryptography standards / NESSIE / MISTY1 / KHAZAD / SHA-2 / Katholieke Universiteit Leuven / SHACAL / Leuven / Whirlpool / Cryptography / Block ciphers / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2005-06-13 10:26:02
789Cryptographic hash functions / Keccak / Skein / JH / Grøstl / SHA-1 / SHA-2 / Advanced Encryption Standard / Crypt / Error detection and correction / NIST hash function competition / Cryptography

SHA-3 Conference, March 2012, Evaluation of Compact FPGA Implementations for All SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:04:20
790NIST hash function competition / SHA-2 / Keccak / Crypt / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

SHA[removed]Workshop Call for Papers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-13 08:24:21
UPDATE