<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic hash functions / NIST hash function competition / Flynn's taxonomy / Parallel computing / SIMD / SHA-3 / Hash function / Block cipher / MerkleDamgrd construction / One-way compression function
Date: 2018-06-14 07:12:39
Cryptography
Cryptographic hash functions
NIST hash function competition
Flynn's taxonomy
Parallel computing
SIMD
SHA-3
Hash function
Block cipher
MerkleDamgrd construction
One-way compression function

SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter: Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Download Document from Source Website

File Size: 782,49 KB

Share Document on Facebook

Similar Documents

Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

DocID: 1uAoQ - View Document

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, ,   Abstract. MD5 is one of the most widely used cryptographic hash funct

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

DocID: 1uyAd - View Document

Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

DocID: 1tYRg - View Document

GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

DocID: 1rud6 - View Document