DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» MD6
MD6
Indifferentiable Authenticated Encryption
Rebound Attack
The Hitchhiker's Guide to the SHA-3 Competition
NISTIR 7620 Status Report on the First Round of the SHA-3
Master Thesis Proposal Continuation of the Security Proofs of the MD6 Hash Function Mode of Operation
Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D
Grøstl – a SHA-3 Candidate
Attacks on and Advances in Secure Hash Algorithms
Security Analysis of BLAKE2's Modes of Operation
Hash Function Design Overview of the Basic Components in SHA-3 Competition
Correlation Cube Attacks: from Weak-Key Distinguisher to Key Recovery
Restoring the Differential Resistance Of
Innovations in Symmetric Cryptography
Lecture Notes on Cryptographic Boolean Functions
Cube Testers: Theory and Practice
Signing Multiple Messages Using MD6 Hash Algorithm
Indifferentiability of Permutation-Based Compression
SHA-3 Hash Competition, Round 1
Top View
Attacks on Stream Ciphers: a Perspective
Linearization Framework for Collision Attacks: Application to Cubehash and MD6 (Extended Version?)
NISTIR 7764, Status Report on the Second Round of the SHA-3
Algorithms, Key Size and Parameters Report – 2014
Classification of the SHA-3 Candidates
Permutation Based Cryptography for Iot
The SHA-3 FIPS
Performance Analysis of the SHA-3 Candidates on Exotic Multi-Core Architectures
Side- Channel Cube Attack on Simeck32/64
Design and Analysis of Cryptographic Algorithms for Authentication
Indifferentiable Authenticated Encryption
Improve the Integrity of Data Using Hashing Algorithms P Varaprasada Rao, S Govinda Rao , P Chandrasekhar Reddy, G R Sakthidharan , Y Manoj Kumar
Survey of Cryptanalysis on Hash Functions
Parallel Implementations of MD6, a Modern Cryptographic Hash Function
High Speed FPGA Implementation of Cryptographic Hash Function
Security Evaluation of Stream Cipher Enocoro-128V2
The MD6 Hash Function Ronald L. Rivest MIT
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
The MD6 Hash Function a Proposal to NIST for SHA-3
Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D
Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
A Study on RAM Requirements of Various SHA-3 Candidates on Low-Cost 8-Bit Cpus
VLSI Implementations of the Cryptographic Hash Functions MD6 and Ïrrupt
The Cryptographic Hash Function Crisis and the SHA-3 Competition
FASTER FILE MATCHING USING GPGPU's by Deephan Venkatesh
Open Problems in Hash Function Security
Symmetric Key Cryptography PQCRYPTO Summer School on Post-Quantum Cryptography 2017
Methods of Symmetric Cryptanalysis
Demise of MD5 and SHA-1 Emerging New Hash
The First SHA-3 Candidate Conference Program
The Boolfun Package : Cryptographic Properties of Boolean Functions
A New Distinguisher on Grain V1 for 106 Rounds
Improved Rebound Attack on the Finalist Grøstl