Back to Results
First PageMeta Content
Cryptographic hash functions / SHA-1 / Keccak / Skein / BLAKE / Secure Hash Standard / CubeHash / Vlastimil Klíma / SIMD / NIST hash function competition / Error detection and correction / Cryptography


NISTIR 7764, Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition
Add to Reading List

Document Date: 2012-03-01 16:20:57


Open Document

File Size: 338,92 KB

Share Result on Facebook

City

Gaithersburg / /

Country

Belgium / /

/

Facility

William E. Hall / Background The National Institute of Standards and Technology / University of California / /

IndustryTerm

security applications / software performance / software implementations / hash algorithm / software-benchmarking project / hash web site / candidate hash algorithms / software evaluations / minor modifications to their algorithms / hash algorithms / cryptographic hash algorithm / candidate algorithms / /

Organization

SHA-1 government / U.S. Department of Commerce / Institute of Standards and Technology Gaithersburg / University of California / Santa Barbara / Institute of Standards and Technology Patrick D. Gallagher / National Institute of Standards and Technology / Katholieke Universiteit Leuven / /

Person

Danilo Gligoroski / Mohamed El-Hadedy / Thomas Fuhr / Céline Thuillet / Thomas Peyrin / M. Kelsey Souradyuti Paul Rene Peralta / Olivier Billet / Willi Meier / Joan Daemen / Daniel J. Bernstein Ryad Benadjila / Jon Callas / Gary Locke / Charles Bouillaguet / Guido Bertoni / Sara J. Caswell / Gilles Macario-Rat / Quynh Dang / Jesse Walker / Aline Gouget / Jean-Philippe Aumasson / Ray Perlner Lawrence / Luca Henzen / Marion Videau Eli Biham / John M. Kelsey / Martin Schläffer / Thomas Pornin / Jean-François Misarsky / William Burr Donghoon / Lars R. Knudsen / Christian Rechberger / Doug Whiting / Matt Robshaw / Emmanuel Bresson / Benoît ChevallierMames / Lily Chen / Henri Gilbert / Stefan Lucks / Tadayoshi Kohno / James Nechvatal / Pierre-Alain Fouque Niels Ferguson / Jean-René Reinhard / Florian Mendel / Praveen Gauravaram / Anne Canteaut / Patrick D. Gallagher / Elaine Barker / Thomas Icart / Gilles Van Assche Christophe De Cannière / Morris J. Dworkin John / Lawrence E. Bassham William / Bruce Schneier / Christophe Clavier / Lawrence E . Bassham William Burr Donghoon / Andrew Regenscheid / Johan Knapskog / William Burr Donghoon Chang Shu / Pascal Paillier / /

Position

Secretary / Candidate Conference / forward for the competition / Director / /

ProgrammingLanguage

R / C / /

ProvinceOrState

Maryland / California / /

Technology

candidate algorithms / RAM / selected fifty-one candidate algorithms / hash algorithm / Information Technology / Second-round Candidates Algorithm / Cryptography / candidate hash algorithms / hash algorithms / cryptographic hash algorithm / /

URL

http /

SocialTag