DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Sponge function
Sponge function
Permutation-Based Encryption, Authentication and Authenticated Encryption
Cryptographic Sponge Functions
Broad View of Cryptographic Hash Functions
The Password Hashing Competition Prehistory of Password Protection
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor †
A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications
SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions
Um Esquema De Hash De Senhas Com Maior Segurança Contra Trade-Offs Entre Processamento E Memória
SHA-3 and Permutation-Based Cryptography
Appendix K SHA-3
Design of SHA-3 Algorithm Using Compression Box (3200 Bit) for Digital Signature Applications
Keccak and the SHA-3 Standardization
Secure Password Storing Using Prime Decomposition Chaovalit Somboonpattanakit and Nawaporn Wisitpongphan
Hash Functions Add-On
Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
Sponges and Engines an Introduction to Keccak and Keyak Jos Wetzels, Wouter Bokslag
SHA-3 Conference, February 2009, Keccak
Cryptographic Sponges
Top View
Generalizing the Sponge Hash Functions
A Keyed Sponge Construction with Pseudorandomness in the Standard Model
Security II: Cryptography
Chapter 11 Cryptographic Hash Functions
Permutation Based Cryptography for Iot
Customizable Sponge-Based Authenticated Encryption Using 16-Bit S-Boxes
Authenticated and Resilient Disk Encryption
Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
AICHAIN Yellowpaper Version
Implementation of the Catena Password-Scrambling Framework
Lyra2: Efficient Password Hashing with High Security Against Time-Memory Trade-Offs
On Selected Issues of Full Disk Encryption
Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
PHC: the Candidates
Comparative Analysis of Cryptographic Hash Functions
Hash Algorithms Hash Algorithms Driven by the Slowness of RSA in Signing a Message
Security Analysis of Extended Sponge Functions Hash Functions in Cryptology: Theory and Practice Leiden, Netherlands
Keccak Sponge Function Family Main Document
Lyra2: Password Hashing Scheme with Improved Security Against Time-Memory Trade-Offs
SHA-3 and the Hash Function Keccak
The Keccak SHA-3 Submission
Sponge Function Family Main Document
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
On the Security of the Keyed Sponge Construction
Open Problems in Hash Function Security
On the Security of Sponge-Type Authenticated Encryption Modes
Sponge Functions
FIPS Publication 202: SHA-3 Standard: Permutation-Based Hash
Performance Analysis of Sha-2 and Sha-3 Finalists
Cryptographic Hash Functions: SHA Family
On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices
FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, August 2015
Double Length Sponge Construction DLP-Sponge