DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» SMASH (hash)
SMASH (hash)
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Grøstl – a SHA-3 Candidate∗
Security Analysis for MQTT in Internet of Things
A (Second) Preimage Attack on the GOST Hash Function
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Advanced Meet-In-The-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Research Intuitions of Hashing Crypto System
Avalanche Handbook
Preimages for Reduced SHA-0 and SHA-1
SMASH Implementation Requirements
Randomness Analysis in Authenticated Encryption Systems
Evaluation of Cryptographic Packages
S2600WF Technical Product Specification
Symmetric Cryptography Dagstuhl Seminar
Bachelor Thesis
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1
Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms
Preimages of Reduced SHA-0 and SHA-1
Top View
The Contribution of the Cryptographic Bureaus in the World War
Collision Attack on 5 Rounds of Grøstl
BYTE SLICING GRØSTL Optimized Intel AES-NI and 8-Bit Implementations of the SHA-3 Finalist Grøstl
Grøstl – a SHA-3 Candidate ∗
Russian Oppression in Ukraine
Cryptanalysis of AES-Based Hash Functions
Collision Attack on 5 Rounds of Grøstl
Cryptographic Hash Functions
The Hash Function Family LAKE
Verified Correctness and Security of Openssl HMAC Lennart Beringer, Princeton University; Adam Petcher, Harvard University and MIT Lincoln Laboratory; Katherine Q
Cryptanalysis of a Class of Cryptographic Hash Functions
Git As an Encrypted Distributed Version Control System Russell G
SECURITY PITFALLS in CRYPTOGRAPHY by Bruce Schneier
Grøstl Summary and Security Analysis
Mergepoint® Embedded Management Software (EMS)
Security of Hard Disk Encryption
Cryptographic Hash Functions
Attacks on JH, Grøstl and SMASH Hash Functions
Hash Functions & Basic Ciphers
Compact DTLS 1.2 Implementation and a Suggestion for Improved DTLS-Secured Multicast Topology
Självständigt Arbete På Grundnivå
References Release 9.4
A Comparison of Two Modes for AEAD Services in Wireless Sensor Networks
Cryptographic Hash Functions Are Very Briefly Introduced, and a Short Summary of Each of the Following Chapters Is Given
SMASH: Sparse Matrix Atomic Scratchpad Hashing
Cryptanalysis of Tweaked Versions of SMASH and Reparation
SMASH: Modular Security for Mobile Agents
Analysis of Kupyna
Cryptography a Study of Modern Cryptography and Its Mathematical Methods
Advanced Meet-In-The-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Vmware Esxi 6.7 Update 2 with 6.7 Patch Version 201905001
Cisco Unified Computing System (UCS) Standalone, Version 4.0(4I)
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
A Verified Hardware/Software Co-Design for Remote Attestation
Cryptographic Hash Functions: Cryptanalysis, Design and Applications
Avalanche Effect in Improperly Initialized CAESAR Candidates
The Lyx User's Guide
Data Link Layer Security for Spacecraft Communication Implementation on FPGA
Självständigt Arbete På Grundnivå Independent Degree Project – First Cycle