1![IMPROVED ANALYSIS OF THREEFISH Jean-Philippe Aumasson, Willi Meier, Raphael Phan 1/5
THREEFISH IMPROVED ANALYSIS OF THREEFISH Jean-Philippe Aumasson, Willi Meier, Raphael Phan 1/5
THREEFISH](https://www.pdfsearch.io/img/4453fd135e9849b4f9d2358a240c1760.jpg) | Add to Reading ListSource URL: 131002.net- Date: 2012-08-14 06:47:00
|
---|
2![Optimally Secure Tweakable Blockciphers Bart Mennink Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and iMinds, Belgium Abstract. We consider the generic design of a tweakable blockci Optimally Secure Tweakable Blockciphers Bart Mennink Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and iMinds, Belgium Abstract. We consider the generic design of a tweakable blockci](https://www.pdfsearch.io/img/970e91277b6cf5ac09002db3f8cd6d34.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-21 16:18:36
|
---|
3![Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction](https://www.pdfsearch.io/img/3f03464227e0658bf16b4382f08e7ec6.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:32
|
---|
4![The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm](https://www.pdfsearch.io/img/f2f89ebf3b9a808a3adee30f328578f9.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:32
|
---|
5![A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010 A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010](https://www.pdfsearch.io/img/3776892a1761c8834fbc75bb49edd8c0.jpg) | Add to Reading ListSource URL: people.item.ntnu.noLanguage: English - Date: 2010-11-15 08:00:24
|
---|
6![Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010 Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010](https://www.pdfsearch.io/img/bfb8b1a4cb7ef451cc0ad850c773b454.jpg) | Add to Reading ListSource URL: www-pequan.lip6.frLanguage: English - Date: 2011-09-20 16:50:32
|
---|
7![Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be](https://www.pdfsearch.io/img/2a8f6d8c8dba42e37b766502044173a6.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-06-24 03:49:53
|
---|
8![Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed] Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]](https://www.pdfsearch.io/img/c192261d1e36325e79f8dea2b419fc6d.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:32
|
---|
9![The Second SHA-3 Candidate Conference Accepted Papers The Second SHA-3 Candidate Conference Accepted Papers](https://www.pdfsearch.io/img/f0fbdb045509d0574c0b24242c3d4904.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-05-30 12:50:30
|
---|
10![The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion] Zip files of the presentations and papers are now available. First Day The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion] Zip files of the presentations and papers are now available. First Day](https://www.pdfsearch.io/img/63cb64f8e4e9b3d1262112d516f5a525.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2013-04-29 14:27:39
|
---|