<--- Back to Details
First PageDocument Content
Cryptography / SHA-2 / SANDstorm hash / SHA-1 / MD6 / NaSHA / Keccak / Elliptic curve only hash / Collision attack / Error detection and correction / Cryptographic hash functions / NIST hash function competition
Date: 2012-06-07 14:18:38
Cryptography
SHA-2
SANDstorm hash
SHA-1
MD6
NaSHA
Keccak
Elliptic curve only hash
Collision attack
Error detection and correction
Cryptographic hash functions
NIST hash function competition

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 322,31 KB

Share Document on Facebook

Similar Documents

Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium Jean-Philippe Aumasson1∗ , Itai Dinur2 , Willi Meier1† , and Adi Shamir2 1 2

DocID: 1nvfd - View Document

Cube Testers and Key-Recovery Attacks on Reduced-Round MD6 and Trivium Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir

DocID: 1nj2F - View Document

NIST hash function competition / Cryptography / Skein / SHA-3 / SHA-2 / Grstl / JH / Cryptographic hash function / BLAKE / 64-bit computing / X86-64 / MD6

sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

DocID: 1mjOJ - View Document

ATA/AACE Guidelines Rebecca S. Bahn (Chair), MD1,*; Henry B. Burch, MD2; David S. Cooper, MD3; Jeffrey R. Garber, MD, FACP, FACE4; M. Carol Greenlee, MD 5; Irwin Klein, MD6; Peter Laurberg, MD7; I. Ross McDougall, MD8;

DocID: 1eHex - View Document