DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Fugue (hash function)
Fugue (hash function)
RESOURCE-EFFICIENT CRYPTOGRAPHY for UBIQUITOUS COMPUTING Lightweight Cryptographic Primitives from a Hardware & Software Perspective
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using Fpgas
Sharing Resources Between AES and the SHA-3 Second Round
Rebound Attack
A Short Note on AES-Inspired Hashes
NISTIR 7620 Status Report on the First Round of the SHA-3
High-Speed Hardware Implementations of BLAKE, Blue
Improved Security Analysis of Fugue-256⋆
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Attacks on Cryptographic Hash Functions and Advances Arvind K
The Hash Function “Fugue 2.0”
The Hash Function “Fugue”
New Developments in Cryptology Outline Outline Block Ciphers AES
Lightweight Hardware Architectures for Efficient Secure Hash Functions
Accelerating AES with Vector Permute Instructions
Brief Comments on NIST SHA-3 Hash Function Candidates
Tools and Experimental Setup for Efficient Hardware Benchmarking of Candidates in Cryptographic Contests
Performance Analysis of the SHA-3 Candidates on Exotic Multi-Core Architectures
Top View
Practical Near-Collisions for Reduced Round Blake, Fugue, Hamsi and JH
Lightweight Implementations of SHA-3 Candidates on Fpgas⋆ ⋆⋆
Methodology for Developing Lightweight Architectures for Fpgas
The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion]
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using Fpgas
Athena – Automated Tool for Hardware Evalualon
Cryptographic Hash Functions
Comparative Analysis of Cryptographic Hash Functions
Hash Algorithms Hash Algorithms Driven by the Slowness of RSA in Signing a Message
Post Quantum Secure Authentication Methods Suitable for Quantum Key Distribution
Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D
A Study on RAM Requirements of Various SHA-3 Candidates on Low-Cost 8-Bit Cpus
Use of Embedded FPGA Resources in Implementa]Ons of 14 Round 2
Provable Security and Indifferentiability Dissertation Defense Committee Dr
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue
Cryptographic Hash Functions: Theory and Practice
Design and Analysis of Cryptographic Algorithms