Top View
- Security Analysis of SIMD
- Security Reductions of the Second Round SHA-3 Candidates
- State of the Hash: SHA-3 and Beyond
- Innovations in Symmetric Cryptography
- Using Carry-Truncated Addition to Analyze Add-Rotate-Xor Hash Algorithms
- SHA-3 Hash Competition, Round 1
- Cryptanalysis of Symmetric Cryptographic Primitives
- Linearization Framework for Collision Attacks: Application to Cubehash and MD6 (Extended Version?)
- NISTIR 7764, Status Report on the Second Round of the SHA-3
- Suga Yuji Considerations of SHA-3 Candidate's Name
- Analysis and Implementation of Estream and SHA-3 Cryptographic Algorithms
- Side-Channel Analysis of Six SHA-3 Candidates in HMAC Scheme
- Brief Comments on NIST SHA-3 Hash Function Candidates
- The SHA-3 FIPS
- Performance Analysis of the SHA-3 Candidates on Exotic Multi-Core Architectures
- Cubehash Parameter Tweak: 10Χ Smaller MAC Overhead
- The Subterranean 2.0 Cipher Suite
- VLSI Characterization of the Cryptographic Hash Function BLAKE Luca Henzen, Student Member, IEEE, Jean-Philippe Aumasson, Willi Meier, and Raphael C.-W
- Survey of Cryptanalysis on Hash Functions
- Sha3: Where We've Been, Where We're Going
- SHA-3 Competition
- High Speed FPGA Implementation of Cryptographic Hash Function
- Analysis of SHA-3 Candidates Cubehash and Keccak
- Hash Algorithms Hash Algorithms Driven by the Slowness of RSA in Signing a Message
- Hash Functions
- Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
- Cryptanalysis of Cubehash
- FPGA Implementations of SHA-3 Candidates: Cubehash, Grøstl, LANE, Shabal and Spectral Hash Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P
- Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue
- Cryptographic Hash Functions: Theory and Practice
- Cubehash Specification (2.B.1)
- Cryptography Based on Hash Function BLAKE 32 in VLSI
- SHA-3 Interoperability
- The Cryptographic Hash Function Crisis and the SHA-3 Competition
- Symmetric Key Cryptography PQCRYPTO Summer School on Post-Quantum Cryptography 2017
- Quantum Attacks Against Blue Midnight Wish, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Shabal, Shavite-3, SIMD, and Skein
- On the Resilience of Even-Mansour to Invariant Permutations
- Introduction to SHA-3 Cubehash Vs. Keccak
- Security Analysis of SIMD∗
- An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
- Security Reductions of the Second Round SHA-3 Candidates