<--- Back to Details
First PageDocument Content
NIST hash function competition / Cryptography / Skein / SHA-3 / SHA-2 / Grstl / JH / Cryptographic hash function / BLAKE / 64-bit computing / X86-64 / MD6
Date: 2015-09-06 14:06:03
NIST hash function competition
Cryptography
Skein
SHA-3
SHA-2
Grstl
JH
Cryptographic hash function
BLAKE
64-bit computing
X86-64
MD6

sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

Add to Reading List

Source URL: www.bolet.org

Download Document from Source Website

File Size: 107,04 KB

Share Document on Facebook

Similar Documents

On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

DocID: 1t9VA - View Document

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

DocID: 1qZv0 - View Document

Microsoft PowerPoint - AWACS-PQC

Microsoft PowerPoint - AWACS-PQC

DocID: 1qio2 - View Document

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1q4rG - View Document