SHA-3

Results: 359



#Item
41INDOCRYPT 09 – Tutorial – “The Design of Code-based Cryptosystems”  1 Code-based Cryptography – Selected publications [1] D. Augot, M. Finiasz, Ph. Gaborit, S. Manuel, and N. Sendrier. SHA-3

INDOCRYPT 09 – Tutorial – “The Design of Code-based Cryptosystems” 1 Code-based Cryptography – Selected publications [1] D. Augot, M. Finiasz, Ph. Gaborit, S. Manuel, and N. Sendrier. SHA-3

Add to Reading List

Source URL: indocrypt09.inria.fr

Language: English - Date: 2009-12-18 10:58:59
    42SHA-3 proposal BLAKE∗ Jean-Philippe Aumasson† Luca Henzen‡  Willi Meier§

    SHA-3 proposal BLAKE∗ Jean-Philippe Aumasson† Luca Henzen‡ Willi Meier§

    Add to Reading List

    Source URL: 131002.net

    Language: English
      43Freestart collision for full SHA-1] Marc Stevens1 o , Pierre Karpman2,3,4 f , and Thomas Peyrin4 b 1 Centrum Wiskunde & Informatica, The Netherlands 2

      Freestart collision for full SHA-1] Marc Stevens1 o , Pierre Karpman2,3,4 f , and Thomas Peyrin4 b 1 Centrum Wiskunde & Informatica, The Netherlands 2

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-02-22 06:11:55
        44Silicon Implementation of SHA-3 Finalists: BLAKE, Grøstl, JH, Keccak and Skein Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali and Patrick Schaumont Center for Embedded Systems for

        Silicon Implementation of SHA-3 Finalists: BLAKE, Grøstl, JH, Keccak and Skein Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali and Patrick Schaumont Center for Embedded Systems for

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2011-05-19 03:02:40
          45Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates using FPGAs? Kris Gaj, Ekawat Homsirikamol, and Marcin Rogawski ECE Department, George Mason University, Fairfa

          Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates using FPGAs? Kris Gaj, Ekawat Homsirikamol, and Marcin Rogawski ECE Department, George Mason University, Fairfa

          Add to Reading List

          Source URL: mason.gmu.edu

          Language: English - Date: 2010-06-26 16:07:12
            46sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract  sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

            sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

            Add to Reading List

            Source URL: www.bolet.org

            Language: English - Date: 2015-09-06 14:06:03
            47UFI MEA office relocates to UAE Expo Centre Sharjah supports move with 3 year hosting agreement Paris/Sharjah - 10 October 2013: The UFI Middle East/ Africa regional office was inaugurated today in a ceremony held in Sha

            UFI MEA office relocates to UAE Expo Centre Sharjah supports move with 3 year hosting agreement Paris/Sharjah - 10 October 2013: The UFI Middle East/ Africa regional office was inaugurated today in a ceremony held in Sha

            Add to Reading List

            Source URL: www.ufi.org

            Language: English - Date: 2013-11-04 06:19:32
            48Length extension attack on narrow-pipe SHA-3 candidates Danilo Gligoroski Department of Telematics, Norwegian University of Science and Technology, O.S.Bragstads plass 2B, N-7491 Trondheim, NORWAY danilo.gligoroski@item.

            Length extension attack on narrow-pipe SHA-3 candidates Danilo Gligoroski Department of Telematics, Norwegian University of Science and Technology, O.S.Bragstads plass 2B, N-7491 Trondheim, NORWAY danilo.gligoroski@item.

            Add to Reading List

            Source URL: people.item.ntnu.no

            Language: English - Date: 2010-11-16 03:53:36
              49OL_SHA SHA-1 Processor Rev 1.3 Overview

              OL_SHA SHA-1 Processor Rev 1.3 Overview

              Add to Reading List

              Source URL: www.ocean-logic.com

              Language: English - Date: 2011-03-20 21:11:06
                50A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha

                A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha

                Add to Reading List

                Source URL: webdocs.cs.ualberta.ca

                Language: English - Date: 2009-10-06 18:16:29