- Home
- » Tags
- » JH (hash function)
Top View
- On the Suitability of SHA-3 Finalists for Lightweight Applications
- JHAE: a Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
- Universal Forgery Attack Against GCM-RUP Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu
- Brief Comments on NIST SHA-3 Hash Function Candidates
- Efficient Hardware Architecture for the AES-CCM Protocol of the IEEE 802.11I Standard
- A Multiple Bit Parity Fault Detection Scheme for the Advanced Encryption Standard Galois/Counter Mode
- Revisiting AES-GCM-SIV: Multi-User Security, Faster Key Derivation, and Better Bounds
- The Hash Function JH
- Practical Near-Collisions for Reduced Round Blake, Fugue, Hamsi and JH
- Theoretical Survey on Secure Hash Functions and Issues
- AES-GCM in TLS 1.3
- Review on DNA Cryptography
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- Versatile FPGA Architecture for Skein Hashing Algorithm David Webster
- Comparative Analysis of Cryptographic Hash Functions
- Hash Algorithms Hash Algorithms Driven by the Slowness of RSA in Signing a Message
- Attacks on JH, Grøstl and SMASH Hash Functions
- Revisiting AES-GCM-SIV: Multi-User Security, Faster Key Derivation, and Better Bounds
- SHA-3 Conference, March 2012, Security Analysis And
- Numbers AES-GCM Efficiency, 154 0-RITT Data, 245 Internals, 152–153 2G Mobile Communications, 89 Security, 154 3DES (Triple DES), 59, 72–74
- Cryptographic Hash Functions: Theory and Practice
- Evaluation of Some Blockcipher Modes of Operation
- The Cryptographic Hash Function Crisis and the SHA-3 Competition
- Silicon Implementation of SHA-3 Final Round Candidates: BLAKE, Grøstl, JH, Keccak and Skein
- Quantum Attacks Against Blue Midnight Wish, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Shabal, Shavite-3, SIMD, and Skein
- Demise of MD5 and SHA-1 Emerging New Hash
- Recommendation for Key-Derivation Methods in Key-Establishment Schemes
- 9: the SHA-3 Competition
- The Perils of Unauthenticated Encryption: Kerberos Version 4∗
- Boosting Authenticated Encryption Robustness with Minimal Modifications
- Security Reductions of the Second Round SHA-3 Candidates
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- Performance Analysis of Sha-2 and Sha-3 Finalists
- NIST.SP.800-175Br1.Pdf
- On the Security of CTR + CBC-MAC
- Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
- Hardware Performance Evaluation of SHA-3 Candidate Algorithms
- Romulus V1.3 Specification