Back to Results
First PageMeta Content
Cryptographic hash functions / Block ciphers / Advanced Encryption Standard / Keccak / Threefish / Skein / Joan Daemen / Grøstl / Crypt / Cryptography / NIST hash function competition / Error detection and correction


The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion] Zip files of the presentations and papers are now available. First Day
Add to Reading List

Document Date: 2013-04-29 14:27:39


Open Document

File Size: 60,87 KB

Share Result on Facebook

City

A SAT / Security / /

Company

BMW / IBM / Nagravision SA / Intel Corporation / ITK Engineering AG / NTT Corporation / Hitachi Ltd. / STMicroelectronics / /

Country

Belgium / France / /

Facility

George Washington University / Middle East Technical University / National Institute of Standards and Technology / George Mason University / Kielce University of Commerce / Institute of Applied Mathematics / Aalto University / Norwegian University of Science / National Institute of Information / Claude Shannon Institute / Tsinghua University / University of Bristol / Corwin Pavilion / Sabanci University / University Bochum / Technical University of Denmark / University of California / University of Illinois at Chicago / /

IndustryTerm

Software speed / /

Organization

Technical University of Denmark / Aalto University / Middle East Technical University / Computer Security Division / University of California / Santa Barbara / National Institute of Information and Communications Technology / Institute for Advanced Study / University of Illinois at Chicago / Tsinghua University Beijing / U.S. Securities and Exchange Commission / Sabanci University / Kielce University of Commerce / National Institute of Standards and Technology / George Washington University / ASIC / Claude Shannon Institute for Discrete Mathematics / Coding and Cryptography / Virginia Tech / University of Bristol / George Mason University / School of Science and Technology / Department of Cryptography / Norwegian University of Science and Technology / Institute of Applied Mathematics / /

Person

John Kelsey / Stefan Heyse / Céline Thuillet / Thomas Peyrin / Mohamed El Hadedy / Daniel Otte / Joan Daemen / Christian Wenzel-Benner / Stefan Tillich / Guido Bertoni / William Burr / Rene Peralta / Closing Remarks William Burr / Bart Mennink / Jean-Philippe Aumasson / Patrick Schaumont / Martin Schläffer / Christian Rechberger / Lawrence Bassham / Doug Whiting / Lily Chen / Ray Perlner / Anne Canteaut / Opening Remarks William Burr / Daniel J. Bernstein / Kris Gaj / Andrew Regenscheid / Gilles Van Assche / Johan Knapskog / /

Position

Manager / Security Technology Group / Session Chair / Timeline Session Chair / Manager / Security Technology Group / D.J. / /

ProvinceOrState

Illinois / California / /

PublishedMedium

the ECHO / /

Technology

FPGA / 8-bit Embedded Processors / encryption / Cryptography / ASIC / Selected Algorithms / /

SocialTag