SHA-3

Results: 359



#Item
511  October 3, 2014 PUBLIC COMMENTS ON THE PUBLIC HEALTH STUDY OF THE MARCELLUS SHALE The Maryland Environmental Health Network wishes to submit the following comments to Maryland agencies with regard to the Marcellus Sha

1 October 3, 2014 PUBLIC COMMENTS ON THE PUBLIC HEALTH STUDY OF THE MARCELLUS SHALE The Maryland Environmental Health Network wishes to submit the following comments to Maryland agencies with regard to the Marcellus Sha

Add to Reading List

Source URL: mdehn.org

Language: English - Date: 2016-01-10 20:51:27
    52SHA-3 proposal BLAKE∗ Jean-Philippe Aumasson† Luca Henzen‡  Willi Meier§

    SHA-3 proposal BLAKE∗ Jean-Philippe Aumasson† Luca Henzen‡ Willi Meier§

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:47:12
      53SHA-3 Conference, February 2009, Shabal

      SHA-3 Conference, February 2009, Shabal

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-06-05 11:30:32
      54SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

      SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

      Add to Reading List

      Source URL: nvlpubs.nist.gov

      Language: English - Date: 2015-08-04 11:34:10
      55Workshop on Symmetric Cryptanalysis 8-10 August 2011 Redmond, USA Follow the spirit of ECRYPT, ESC, and SHA-3 retreats: Talks (1 day): present your

      Workshop on Symmetric Cryptanalysis 8-10 August 2011 Redmond, USA Follow the spirit of ECRYPT, ESC, and SHA-3 retreats: Talks (1 day): present your

      Add to Reading List

      Source URL: fse2011.mat.dtu.dk

      - Date: 2011-02-14 09:01:56
        56FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

        FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

        Add to Reading List

        Source URL: nvlpubs.nist.gov

        Language: English - Date: 2015-08-04 11:33:21
        57Grøstl – a SHA-3 candidate http://www.groestl.info Praveen Gauravaram1 , Lars R. Knudsen1 , Krystian Matusiewicz1 , Florian Mendel2 , Christian Rechberger2 , Martin Schl¨affer2 , and Søren S. Thomsen1 1

        Grøstl – a SHA-3 candidate http://www.groestl.info Praveen Gauravaram1 , Lars R. Knudsen1 , Krystian Matusiewicz1 , Florian Mendel2 , Christian Rechberger2 , Martin Schl¨affer2 , and Søren S. Thomsen1 1

        Add to Reading List

        Source URL: www.groestl.info

        Language: English - Date: 2011-10-06 10:54:44
          58Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research  ECC 2008, Utrecht, Sep

          Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

          Add to Reading List

          Source URL: www.hyperelliptic.org

          Language: English - Date: 2008-09-27 14:59:29
          59NEM  Technical Reference Version 1.0  May 15, 2015

          NEM Technical Reference Version 1.0 May 15, 2015

          Add to Reading List

          Source URL: nem.io

          Language: English - Date: 2015-05-25 20:17:43
          60On Keccak and SHA-3 Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

          On Keccak and SHA-3 Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

          Add to Reading List

          Source URL: ice.mat.dtu.dk

          Language: English - Date: 2013-06-10 04:26:41