DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Sponge function

Sponge function

  • Permutation-Based Encryption, Authentication and Authenticated Encryption

    Permutation-Based Encryption, Authentication and Authenticated Encryption

  • Cryptographic Sponge Functions

    Cryptographic Sponge Functions

  • Broad View of Cryptographic Hash Functions

    Broad View of Cryptographic Hash Functions

  • The Password Hashing Competition Prehistory of Password Protection

    The Password Hashing Competition Prehistory of Password Protection

  • High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor †

    High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor †

  • A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications

    A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications

  • SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions

    SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions

  • Um Esquema De Hash De Senhas Com Maior Segurança Contra Trade-Offs Entre Processamento E Memória

    Um Esquema De Hash De Senhas Com Maior Segurança Contra Trade-Offs Entre Processamento E Memória

  • SHA-3 and Permutation-Based Cryptography

    SHA-3 and Permutation-Based Cryptography

  • Appendix K SHA-3

    Appendix K SHA-3

  • Design of SHA-3 Algorithm Using Compression Box (3200 Bit) for Digital Signature Applications

    Design of SHA-3 Algorithm Using Compression Box (3200 Bit) for Digital Signature Applications

  • Keccak and the SHA-3 Standardization

    Keccak and the SHA-3 Standardization

  • Secure Password Storing Using Prime Decomposition Chaovalit Somboonpattanakit and Nawaporn Wisitpongphan

    Secure Password Storing Using Prime Decomposition Chaovalit Somboonpattanakit and Nawaporn Wisitpongphan

  • Hash Functions Add-On

    Hash Functions Add-On

  • Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications

    Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications

  • Sponges and Engines an Introduction to Keccak and Keyak Jos Wetzels, Wouter Bokslag

    Sponges and Engines an Introduction to Keccak and Keyak Jos Wetzels, Wouter Bokslag

  • SHA-3 Conference, February 2009, Keccak

    SHA-3 Conference, February 2009, Keccak

  • Cryptographic Sponges

    Cryptographic Sponges

Top View
  • Generalizing the Sponge Hash Functions
  • A Keyed Sponge Construction with Pseudorandomness in the Standard Model
  • Security II: Cryptography
  • Chapter 11 Cryptographic Hash Functions
  • Permutation Based Cryptography for Iot
  • Customizable Sponge-Based Authenticated Encryption Using 16-Bit S-Boxes
  • Authenticated and Resilient Disk Encryption
  • Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
  • AICHAIN Yellowpaper Version
  • Implementation of the Catena Password-Scrambling Framework
  • Lyra2: Efficient Password Hashing with High Security Against Time-Memory Trade-Offs
  • On Selected Issues of Full Disk Encryption
  • Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
  • PHC: the Candidates
  • Comparative Analysis of Cryptographic Hash Functions
  • Hash Algorithms Hash Algorithms Driven by the Slowness of RSA in Signing a Message
  • Security Analysis of Extended Sponge Functions Hash Functions in Cryptology: Theory and Practice Leiden, Netherlands
  • Keccak Sponge Function Family Main Document


© 2024 Docslib.org    Feedback