Skein (hash function)
Top View
- Side-Channel Analysis of Keccak and Ascon
- Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 ⋆
- State of the Hash: SHA-3 and Beyond
- Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm
- Mcoe: a Family of Almost Foolproof On-Line Authenticated Encryption Schemes
- Using Carry-Truncated Addition to Analyze Add-Rotate-Xor Hash Algorithms
- Side-Channel Analysis of Grøstl and Skein
- Coarx: a Coprocessor for ARX-Based Cryptographic Algorithms
- Compact Implementation of Threefish and Skein on FPGA
- D2.2 Second Report on New QR Cryptographic Primitives
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- NISTIR 7764, Status Report on the Second Round of the SHA-3
- Examining the Practical Side Channel Resilience of ARX-Boxes
- ZMAC: a Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
- SHA-3 Conference, February 2009, the Skein Hash Function
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- Versatile FPGA Architecture for Skein Hashing Algorithm David Webster