DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Spectral Hash
Spectral Hash
Downloaded on 2017-02-12T13:16:07Z HARDWARE DESIGNOF CRYPTOGRAPHIC ACCELERATORS
Características Y Aplicaciones De Las Funciones Resumen Criptográficas En La Gestión De Contraseñas
Μελέτη Της Ασφάλειας Των Σύγχρονων Συναρτήσεων Σύνοψης
Rebound Attack
The Hitchhiker's Guide to the SHA-3 Competition
Tocubehash, Grøstl, Lane, Toshabal and Spectral Hash
An Efficient Hardware Architecture for Spectral Hash Algorithm
NISTIR 7620 Status Report on the First Round of the SHA-3
Kriptografske Tehničke Sigurnosne Mjere
Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D
Grøstl – a SHA-3 Candidate
PROGRAMSKO OSTVARENJE ALGORITAMA BLAKE, Shabal I SIMD
Comprehensive Comparison of Hardware Performance of Fourteen
Keccak, More Than Just SHA3SUM
Spectral Hash - Shash a SHA-3 Candidate
Downloaded on 2017-02-12T10:18:32Z Cryptographic Coprocessors for Embedded Systems
Keccak and SHA-3: Code and Standard Updates
Classification of the SHA-3 Candidates
Top View
Recent Trends in SCADA and Power Factor Compensation on Low Voltage Power Systems for Advanced Smart Grid
Grøstl – a SHA-3 Candidate ∗
The SHA-3 FIPS
Performance Analysis of the SHA-3 Candidates on Exotic Multi-Core Architectures
Communications and Networking for Smart Grid: Technology and Practice
HARDWARE IMPLEMENTATION of ADVANCED CRYPTOGRAPHIC HASH FUNCTION on Fpgas
Cube Attacks on Cryptographic Hash Functions Joel Lathrop
Survey of Cryptanalysis on Hash Functions
NISTIR 7620-Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
High Speed FPGA Implementation of Cryptographic Hash Function
Rapport De Stage Romain Feron
Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D
S-Hash: Spectral Hash
Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
An Effective Login Authentication Using Two Password Field and Multiple Hash Algorithm
FPGA Implementations of SHA-3 Candidates: Cubehash, Grøstl, LANE, Shabal and Spectral Hash Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P
Symmetric Key Cryptography PQCRYPTO Summer School on Post-Quantum Cryptography 2017
Classification of the SHA-3 Candidates
An Enhanced Non- Cryptographic Hash Function
Secure and Efficient Implementations of Cryptographic Primitives