- Home
- » Tags
- » Skein (hash function)
Top View
- Side-Channel Analysis of Keccak and Ascon
- Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 ⋆
- State of the Hash: SHA-3 and Beyond
- Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm
- Mcoe: a Family of Almost Foolproof On-Line Authenticated Encryption Schemes
- Using Carry-Truncated Addition to Analyze Add-Rotate-Xor Hash Algorithms
- Side-Channel Analysis of Grøstl and Skein
- Coarx: a Coprocessor for ARX-Based Cryptographic Algorithms
- Compact Implementation of Threefish and Skein on FPGA
- D2.2 Second Report on New QR Cryptographic Primitives
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- NISTIR 7764, Status Report on the Second Round of the SHA-3
- Examining the Practical Side Channel Resilience of ARX-Boxes
- ZMAC: a Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
- SHA-3 Conference, February 2009, the Skein Hash Function
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- Versatile FPGA Architecture for Skein Hashing Algorithm David Webster
- Tweakable Ciphers: Constructions and Applications
- Comparative Analysis of Cryptographic Hash Functions
- Post Quantum Secure Authentication Methods Suitable for Quantum Key Distribution
- Energy Consumption of Hash Functions
- Optimal Prfs from Blockcipher Designs
- SHA-3 Submission: Skein Hash Function Family Jarrick Goldhamer
- Numbers AES-GCM Efficiency, 154 0-RITT Data, 245 Internals, 152–153 2G Mobile Communications, 89 Security, 154 3DES (Triple DES), 59, 72–74
- Group 2: Skein, ECHO, Dynamic SHA2, ESSENCE
- Cryptographic Hash Functions
- Brief Comments on NIST SHA-3 Hash Function Candidates
- Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein
- Silicon Implementation of SHA-3 Final Round Candidates: BLAKE, Grøstl, JH, Keccak and Skein
- SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3
- BTM: a Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption
- Boosting Authenticated Encryption Robustness with Minimal Modifications
- Skein and Threefish Implementation on FPGA
- The Skein Hash Function Family
- An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- Performance Analysis of Sha-2 and Sha-3 Finalists
- Botan Reference Guide Release 2.18.1
- Hash Functions: Part 2 Macs & Authenticated Ciphers Required Reading
- Hardware Performance Evaluation of SHA-3 Candidate Algorithms
- Jetico User Manual
- Skein Proofs
- The Skien Hash Function