Sponge function

Results: 19



#Item
1

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

- Date: 2013-02-27 15:26:40
    2

    Forestry The region’s forests function as habitat for a panoply of remarkable species, a sponge that sustains watersheds, and a resource for industry and recreation. At the same time, our forests confront the spread of

    Add to Reading List

    Source URL: crownroundtable.org

    - Date: 2013-06-03 14:45:06
      3Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

      Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

      Add to Reading List

      Source URL: keccak.noekeon.org

      Language: English - Date: 2013-02-27 15:26:40
      4Cryptography / NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Joan Daemen / Gilles Van Assche / Differential cryptanalysis / Data Encryption Standard

      Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

      Add to Reading List

      Source URL: keccak.noekeon.org

      Language: English - Date: 2013-02-27 15:26:40
      5Cryptographic hash functions / Cryptography / NIST hash function competition / Stream ciphers / SHA-3 / Hashing / Sponge function / RadioGatn / Gilles Van Assche / Joan Daemen / Hash function / Random oracle

      Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

      Add to Reading List

      Source URL: www.cosic.esat.kuleuven.be

      Language: English - Date: 2013-09-19 10:37:36
      6NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Gilles Van Assche / Joan Daemen / Data Encryption Standard / Permutation / Differential cryptanalysis

      Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

      Add to Reading List

      Source URL: keccak.noekeon.org

      Language: English - Date: 2013-02-27 15:26:40
      7NIST hash function competition / SHA-3 / Cryptographic hash functions / Hashing / Cryptography / Sponge function / Gilles Van Assche / Joan Daemen / Hash function

      Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

      Add to Reading List

      Source URL: keccak.noekeon.org

      Language: English - Date: 2013-02-27 15:26:40
      8NIST hash function competition / SHA-3 / Cryptographic hash functions / Hashing / Sponge function / Cryptography / Gilles Van Assche

      Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

      Add to Reading List

      Source URL: keccak.noekeon.org

      Language: English - Date: 2013-02-27 15:26:40
      9Cryptography / Cryptographic hash functions / NIST hash function competition / SHA-3 / Sponge function / Password / Crypt / Hash function / Exclusive or / Key derivation function / Lyra2

      Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2014-04-14 07:18:05
      10Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

      SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

      Add to Reading List

      Source URL: nvlpubs.nist.gov

      Language: English - Date: 2015-08-04 11:34:10
      UPDATE