DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» HAIFA construction
HAIFA construction
NISTIR 7620 Status Report on the First Round of the SHA-3
Re-Visiting HAIFA and Why You Should Visit Too
Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-Like Compression Functions (Full Version)?
Attacks on and Advances in Secure Hash Algorithms
Improved Generic Attacks Against Hash-Based Macs and HAIFA⋆
A Framework for Iterative Hash Functions — HAIFA*
State of the Hash: SHA-3 and Beyond
Design and Analysis of Hash Functions
Downloaded on 2017-02-12T10:18:32Z Cryptographic Coprocessors for Embedded Systems
Construction Methods on Cryptographic Hash Functions * C
Design and Analysis of Hash Functions
Merkle-Damgård Construction Method and Alternatives: a Review
The Shavite-3 Hash Function Tweaked Version
Improved Generic Attacks Against Hash-Based Macs and HAIFA⋆
Dissertation Docteur De L'université Du Luxembourg
Analysis of SHA-3 Candidates Cubehash and Keccak
Improved Generic Attacks Against Hash-Based Macs and HAIFA
A Framework for Iterative Hash Functions — HAIFA*
Top View
Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
SHA-3 Conference, March 2012, Security Analysis And
Provable Security of Cryptographic Hash Functions
Constructions and Attacks on Hash Functions
The Shavite-3 Hash Function
Security Reductions of the Second Round SHA-3 Candidates
Symmetric Cryptography Dagstuhl Seminar
Functional Graphs and Their Applications in Cryptanalysis
VLSI Circuits for Cryptographic Authentication
Cryptographic Hash Functions and Attacks–A Detailed Study