Uncategorized files
From The ECRYPT Hash Function Website
Showing below up to 50 results in range #21 to #70.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- BoolePaper.pdf ; 726 KB
- Cheetah.pdf ; 272 KB
- Cheetah256-12r.txt ; 4 KB
- Cheetah length-extension.txt ; 669 bytes
- Chi submission.pdf ; 593 KB
- CommentNov2010.pdf ; 60 KB
- Crunch.txt ; 673 bytes
- Cubehash.pdf ; 78 KB
- Cubehash.txt ; 2 KB
- Dch.pdf ; 107 KB
- Dch1.pdf ; 79 KB
- Dsha.pdf ; 104 KB
- DyamicSHA.pdf ; 368 KB
- DyamicSHA2.pdf ; 386 KB
- Dynamic-sha2 length-extension.txt ; 838 bytes
- Dynamic-sha length-extension.txt ; 835 bytes
- Echo.pdf ; 430 KB
- Ecoh.pdf ; 431 KB
- Edon.pdf ; 152 KB
- Enrupt.pdf ; 178 KB
- Fig7.pdf ; 12 KB
- Free-start attacks on Nasha.pdf ; 110 KB
- Fugue path.pdf ; 60 KB
- Grostl-comment-april28.pdf ; 197 KB
- HW type core-funct.jpg 115 × 115; 6 KB
- HW type ext-mem.jpg 229 × 209; 17 KB
- HW type self-cont.jpg 134 × 209; 11 KB
- Hamsi.pdf ; 165 KB
- Hamsi nonrandomness.txt ; 1 KB
- Jh.pdf ; 460 KB
- Jh1.txt ; 1 KB
- Jh20090115.pdf ; 461 KB
- Jh20090915.pdf ; 497 KB
- Jh mt complexity.pdf ; 305 KB
- Jh preimage.pdf ; 93 KB
- Khazaei md6.txt ; 2 KB
- Khichidi-1.pdf ; 460 KB
- Khichidi-1.txt ; 340 bytes
- LUX.pdf ; 205 KB
- LUXATTACKNext.pdf ; 104 KB
- LUXadd.pdf ; 60 KB
- LUXdistinguisher.zip ; 6 KB
- Lesamnta.pdf ; 586 KB
- Luffa Specification.pdf ; 226 KB
- Luffa SupportingDocument.pdf ; 292 KB
- Lux dai.txt ; 2 KB
- Lux nicky.txt ; 3 KB
- Lux niels.txt ; 3 KB