SHA-2

Results: 893



#Item
811Grøstl / SHA-1 / Advanced Encryption Standard / SHA-2 / Tiger / MD5 / Hash function / Permutation / Block cipher / Error detection and correction / Cryptographic hash functions / Cryptography

Grøstl – a SHA-3 candidate ∗

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:38
812Stream ciphers / Threefish / Skein / ICE / VEST / SHA-2 / SHA-1 / Block cipher / Salsa20 / Cryptography / Error detection and correction / Cryptographic hash functions

Improved Cryptanalysis of Skein 3 ¨

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-08 02:25:05
813SHA-1 / MD5 / Collision attack / MD4 / SHA-2 / Cryptanalysis / Padding / Crypt / Tiger / Cryptography / Cryptographic hash functions / Hashing

Counter-cryptanalysis Marc Stevens CWI, Amsterdam, The Netherlands

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2013-06-08 07:57:19
814Computer architecture / Cryptographic hash functions / Instruction set architectures / Keccak / Skein / SHA-1 / Fugue / SHA-2 / CPU cache / Error detection and correction / NIST hash function competition / Computing

SHA-3 Conference, August 2010, Comparative Performance Review of the SHA-3 Second-Round Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 13:39:10
815NIST hash function competition / Eli Biham / SHA-2 / SHA-1 / Preimage attack / MD5 / Advanced Encryption Standard / Keccak / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

Updates on SHAvite-3 Eli Biham1 and Orr Dunkelman2 1

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2010-08-24 17:09:24
816Hashing / Hash function / Preimage attack / Padding / SHA-2 / Collision attack / Merkle–Damgård construction / Collision resistance / One-way compression function / Cryptographic hash functions / Cryptography / Error detection and correction

A Framework for Iterative Hash Functions — HAIFA Eli Biham1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-08 13:12:03
817NIST hash function competition / Search algorithms / MD5 / BLAKE / Keccak / Hash function / Block cipher / Differential cryptanalysis / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

Analysis of BLAKE2 Jian Guo1 , Pierre Karpman1,2 , Ivica Nikoli´c1 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-29 13:50:06
818Chemistry / Containers / Milk bottle / Mason jar / Bottle / Beer bottle / Wine bottle / Polyethylene terephthalate / Muncie /  Indiana / Technology / Glass bottles / Packaging

2 March-April 2007

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2010-09-30 17:44:36
819National Security Agency / NSA Suite B Cryptography / Elliptic curve cryptography / SHA-2 / SHA-1 / Advanced Encryption Standard / Key size / CRYPTREC / Cryptography / Cryptography standards / Cryptographic hash functions

Suite B Cryptography March 22, 2006 Elaine Barker

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-26 01:00:00
820Keccak / NIST hash function competition / RadioGatún / Joan Daemen / SHA-1 / SHA-2 / National Security Agency / Hash function / Cryptographic hash functions / Error detection and correction / Cryptography

Keccak and the SHA-3 Standardization

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-11 13:30:30
UPDATE