Difference between revisions of "Keccak"

From The ECRYPT Hash Function Website
m (The algorithm)
Line 3: Line 3:
 
* Author(s): Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche
 
* Author(s): Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche
 
* Website: [http://keccak.noekeon.org/ http://keccak.noekeon.org/]  
 
* Website: [http://keccak.noekeon.org/ http://keccak.noekeon.org/]  
 +
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Keccak.zip Keccak.zip]
 
* Specification:
 
* Specification:
  
Line 24: Line 25:
 
}
 
}
 
</bibtex>
 
</bibtex>
 
 
  
 
== Cryptanalysis ==
 
== Cryptanalysis ==
  
 
* None yet
 
* None yet

Revision as of 11:21, 11 December 2008

1 The algorithm

G. Bertoni, J. Daemen, M. Peeters, G. Van Assche - Keccak specifications

,2008
http://keccak.noekeon.org/Keccak-specifications.pdf
Bibtex
Author : G. Bertoni, J. Daemen, M. Peeters, G. Van Assche
Title : Keccak specifications
In : -
Address :
Date : 2008

G. Bertoni, J. Daemen, M. Peeters, G. Van Assche - Keccak sponge function family main document

,2008
http://keccak.noekeon.org/Keccak-main-1.0.pdf
Bibtex
Author : G. Bertoni, J. Daemen, M. Peeters, G. Van Assche
Title : Keccak sponge function family main document
In : -
Address :
Date : 2008

2 Cryptanalysis

  • None yet