DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Skein (hash function)

Skein (hash function)

  • IMPLEMENTATION and BENCHMARKING of PADDING UNITS and HMAC for SHA-3 CANDIDATES in FPGAS and ASICS by Ambarish Vyas a Thesis Subm

    IMPLEMENTATION and BENCHMARKING of PADDING UNITS and HMAC for SHA-3 CANDIDATES in FPGAS and ASICS by Ambarish Vyas a Thesis Subm

  • The Boomerang Attacks on the Round-Reduced Skein-512 *

    The Boomerang Attacks on the Round-Reduced Skein-512 *

  • An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage

    An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage

  • SHA-3 Conference, March 2012, Skein: More Than Just a Hash Function

    SHA-3 Conference, March 2012, Skein: More Than Just a Hash Function

  • Authenticated Encryption with Small Stretch (Or, How to Accelerate AERO) ⋆

    Authenticated Encryption with Small Stretch (Or, How to Accelerate AERO) ⋆

  • Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

  • Modes of Operation for Compressed Sensing Based Encryption

    Modes of Operation for Compressed Sensing Based Encryption

  • High-Speed Hardware Implementations of BLAKE, Blue

    High-Speed Hardware Implementations of BLAKE, Blue

  • An Efficient Parallel Algorithm for Skein Hash Functions

    An Efficient Parallel Algorithm for Skein Hash Functions

  • Rotational Rebound Attacks on Reduced Skein

    Rotational Rebound Attacks on Reduced Skein

  • Authenticated Encryption on Fpgas from the Reconfigurable Part to the Static Part Karim Moussa Ali Abdellatif

    Authenticated Encryption on Fpgas from the Reconfigurable Part to the Static Part Karim Moussa Ali Abdellatif

  • Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

    Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

  • Attacks on and Advances in Secure Hash Algorithms

    Attacks on and Advances in Secure Hash Algorithms

  • Security Policy: Java Crypto Module

    Security Policy: Java Crypto Module

  • Keccak, More Than Just SHA3SUM

    Keccak, More Than Just SHA3SUM

  • Theory and Practice Theory and Practice for Hash Functions

    Theory and Practice Theory and Practice for Hash Functions

  • Security of Authenticated Encryption Modes

    Security of Authenticated Encryption Modes

  • Performance of Message Authentication Codes for Secure Ethernet

    Performance of Message Authentication Codes for Secure Ethernet

Top View
  • Side-Channel Analysis of Keccak and Ascon
  • Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 ⋆
  • State of the Hash: SHA-3 and Beyond
  • Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm
  • Mcoe: a Family of Almost Foolproof On-Line Authenticated Encryption Schemes
  • Using Carry-Truncated Addition to Analyze Add-Rotate-Xor Hash Algorithms
  • Side-Channel Analysis of Grøstl and Skein
  • Coarx: a Coprocessor for ARX-Based Cryptographic Algorithms
  • Compact Implementation of Threefish and Skein on FPGA
  • D2.2 Second Report on New QR Cryptographic Primitives
  • Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
  • Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
  • NISTIR 7764, Status Report on the Second Round of the SHA-3
  • Examining the Practical Side Channel Resilience of ARX-Boxes
  • ZMAC: a Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
  • SHA-3 Conference, February 2009, the Skein Hash Function
  • Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
  • Versatile FPGA Architecture for Skein Hashing Algorithm David Webster


© 2024 Docslib.org    Feedback