Sponge function
Top View
- Generalizing the Sponge Hash Functions
- A Keyed Sponge Construction with Pseudorandomness in the Standard Model
- Security II: Cryptography
- Chapter 11 Cryptographic Hash Functions
- Permutation Based Cryptography for Iot
- Customizable Sponge-Based Authenticated Encryption Using 16-Bit S-Boxes
- Authenticated and Resilient Disk Encryption
- Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
- AICHAIN Yellowpaper Version
- Implementation of the Catena Password-Scrambling Framework
- Lyra2: Efficient Password Hashing with High Security Against Time-Memory Trade-Offs
- On Selected Issues of Full Disk Encryption
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- PHC: the Candidates
- Comparative Analysis of Cryptographic Hash Functions
- Hash Algorithms Hash Algorithms Driven by the Slowness of RSA in Signing a Message
- Security Analysis of Extended Sponge Functions Hash Functions in Cryptology: Theory and Practice Leiden, Netherlands
- Keccak Sponge Function Family Main Document