- Home
- » Tags
- » Lane (hash function)
Top View
- A Security Analysis of Deoxys and Its Internal Tweakable Block Ciphers
- Sponges and Engines an Introduction to Keccak and Keyak Jos Wetzels, Wouter Bokslag
- L Journal of Scientific Research & Engineering Trends Volume 5, Issue 1, Jan-Feb-2019, ISSN (Online): 2395-566X
- Hash Functions
- Classification of the SHA-3 Candidates
- Cryptanalysis of AES-Based Hash Functions
- Openssl/FIPS 2.0 Security Policy
- Collision Attacks Against CAESAR Candidates Forgery and Key-Recovery Against AEZ and Marble
- The SHA-3 FIPS
- Efficient Hardware Implementation of SHA-3 Candidate Grøstl Using FPGA
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- Wed 1354 RISCV-Cryptoextensions-Richardnewell
- High Speed FPGA Implementation of Cryptographic Hash Function
- BLAKE HASH Function Family on FPGA: from the Fastest to the Smallest
- Hash Algorithms Hash Algorithms Driven by the Slowness of RSA in Signing a Message
- Evaluation of SHA-3 Candidates for 8-Bit Embedded Processors
- Efficient Cryptography on the RISC-V Architecture
- SHA-3 and the Hash Function Keccak
- Apunet: Revitalizing GPU As Packet Processing Accelerator
- Security Amendment 2: Extended Packet Numbering
- Finding Bugs in Cryptographic Hash Function Implementations
- The Keccak SHA-3 Submission
- A Study on RAM Requirements of Various SHA-3 Candidates on Low-Cost 8-Bit Cpus
- 11 Customizing STIX
- FPGA Implementations of SHA-3 Candidates: Cubehash, Grøstl, LANE, Shabal and Spectral Hash Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P
- Cryptographic Hash Functions: Theory and Practice
- Design, Implementation and Analysis of Keyed Hash Functions Based on Chaotic Maps and Neural Networks Nabil Abdoun
- Ultra Low Power Wi-Fi Soc Final
- FIPS Publication 202: SHA-3 Standard: Permutation-Based Hash
- The Lane Hash Function
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash
- DA16200 Datasheet
- Rebound Attack on the Full Lane Compression Function ?
- Mode-Level Vs. Implementation-Level Physical Security in Symmetric Cryptography a Practical Guide Through the Leakage-Resistance Jungle