Back to Results
First PageMeta Content
Keccak / Hashing / Block ciphers / Joan Daemen / Threefish / Skein / Fugue / Bart Preneel / Crypt / Cryptography / NIST hash function competition / Cryptographic hash functions


The Second SHA-3 Candidate Conference Accepted Papers
Add to Reading List

Document Date: 2012-05-30 12:50:30


Open Document

File Size: 102,88 KB

Share Result on Facebook

City

A SAT / /

Company

AES / /

Facility

Building Power Analysis Resistant Implementations / /

Organization

ASIC / /

Person

Kerry A. McKay / Christian Rechberger / Ingo von Maurich / Elena Andreeva / Thomas Poeppelmann / Akashi Satoh / Thomas Fuhr / Thomas Plos / Stefan Heyse / Pawel Morawiecki / Ivica Nikolic / Julien Francq / Alexander Szekely / Lei Wang / Joan Daemen / Stefan Lucks / Celine Thuillet / Miroslav Knezevic / Kazuo Ota / Niels Ferguson / Stefan Tillich / Bart Preneel / Marcus Himmel / Charles Bouillaguet / Guido Bertoni / Andrew Byrne / Jean-René Reinhard / Jens Graef / Michaël Peeters / Marian Srebrny / Kazuo Sakiyama / Gaëtan Leurent / Dmitry Khovratovich / María Naya-Plasencia / William P. Marnane / Ram Krishnamurthy / Bart Mennink / Neil Hanley / Grøstl Yu Sasaki / Jens-Peter Kaps / Anne Canteaut / Jesse Walker / Joern-Marc Schmidt / Alexander Wild / Thomas Icart / Martin Feldhofer / Ingrid Verbauwhede / Thomas Eisenbarth / Marion Videau / Daniel J. Bernstein / Yang Li / Kris Gaj / Pierre-Alain Fouque / Patrick Schaumont / Johannes Rave / Martin Schläffer / Brian Baldwin / Kazuo Ohta / Neill Marnane / Gilles Van Assche / Liang Lu / Mark Hamilton / Mario Kirschbaum / Pascal Paillier / /

PublishedMedium

the ECHO / /

Technology

Encryption / FPGA / ASIC / 8-bit Embedded Processors / /

SocialTag