Uncategorized files
From The ECRYPT Hash Function Website
Showing below up to 112 results in range #1 to #112.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- 20090916 SHA-3 HW stillich.pdf ; 343 KB
- 20091112 SHA-3 HW stillich.pdf ; 343 KB
- AURORA.pdf ; 1.08 MB
- Abacus.pdf ; 3.48 MB
- Analysis LUX 1.pdf ; 245 KB
- Arirang-pseudo-sha3zoo.pdf ; 211 KB
- Arirang.pdf ; 737 KB
- Aumasson shabal.txt ; 3 KB
- Bjorstad chi.txt ; 3 KB
- Bkmp ch448.txt ; 2 KB
- Bkmp ch464.txt ; 3 KB
- Blake.pdf ; 436 KB
- Blender-preimage.pdf ; 116 KB
- Blender.pdf ; 80 KB
- Boole.pdf ; 112 KB
- BooleCollision.txt ; 1 KB
- BoolePaper.pdf ; 726 KB
- Cheetah.pdf ; 272 KB
- Cheetah256-12r.txt ; 4 KB
- Cheetah length-extension.txt ; 669 bytes
- Chi submission.pdf ; 593 KB
- CommentNov2010.pdf ; 60 KB
- Crunch.txt ; 673 bytes
- Cubehash.pdf ; 78 KB
- Cubehash.txt ; 2 KB
- Dch.pdf ; 107 KB
- Dch1.pdf ; 79 KB
- Dsha.pdf ; 104 KB
- DyamicSHA.pdf ; 368 KB
- DyamicSHA2.pdf ; 386 KB
- Dynamic-sha2 length-extension.txt ; 838 bytes
- Dynamic-sha length-extension.txt ; 835 bytes
- Echo.pdf ; 430 KB
- Ecoh.pdf ; 431 KB
- Edon.pdf ; 152 KB
- Enrupt.pdf ; 178 KB
- Fig7.pdf ; 12 KB
- Free-start attacks on Nasha.pdf ; 110 KB
- Fugue path.pdf ; 60 KB
- Grostl-comment-april28.pdf ; 197 KB
- HW type core-funct.jpg 115 × 115; 6 KB
- HW type ext-mem.jpg 229 × 209; 17 KB
- HW type self-cont.jpg 134 × 209; 11 KB
- Hamsi.pdf ; 165 KB
- Hamsi nonrandomness.txt ; 1 KB
- Jh.pdf ; 460 KB
- Jh1.txt ; 1 KB
- Jh20090115.pdf ; 461 KB
- Jh20090915.pdf ; 497 KB
- Jh mt complexity.pdf ; 305 KB
- Jh preimage.pdf ; 93 KB
- Khazaei md6.txt ; 2 KB
- Khichidi-1.pdf ; 460 KB
- Khichidi-1.txt ; 340 bytes
- LUX.pdf ; 205 KB
- LUXATTACKNext.pdf ; 104 KB
- LUXadd.pdf ; 60 KB
- LUXdistinguisher.zip ; 6 KB
- Lesamnta.pdf ; 586 KB
- Luffa Specification.pdf ; 226 KB
- Luffa SupportingDocument.pdf ; 292 KB
- Lux dai.txt ; 2 KB
- Lux nicky.txt ; 3 KB
- Lux niels.txt ; 3 KB
- Lux peyrin.txt ; 4 KB
- Maraca.pdf ; 137 KB
- NIST-2ndSHA3Conf-SASAKI.pdf ; 281 KB
- NK2SD-224.txt ; 413 bytes
- NK2SD-512.txt ; 525 bytes
- NandiP-SHAvite-3.txt ; 31 KB
- Nobbi.jpg 110 × 120; 13 KB
- Note SAT-basedPreimageAnalysis.txt ; 800 bytes
- Observations on Blender.pdf ; 123 KB
- Peyrin-SHAvite-3.txt ; 3 KB
- Peyrin ch22 ch364.txt ; 2 KB
- Peyrin cubehashcollision.txt ; 1 KB
- Ponic-1280.zip ; 8 KB
- PonicReference.zip ; 6 KB
- PonicSpecification.pdf ; 364 KB
- SHA1CompressionFunction.jpg 290 × 356; 112 KB
- SHA1StateUpdateTransformation.jpg 509 × 376; 125 KB
- Salt-collision.pdf ; 99 KB
- Sarmal.new.pdf ; 174 KB
- Sarmal.pdf ; 73 KB
- Shabal.pdf ; 2.01 MB
- Shavite.pdf ; 540 KB
- Simd.pdf ; 726 KB
- Specification DIN-A4.pdf ; 355 KB
- Spectralhash.txt ; 2 KB
- Spectralhash heilman.txt ; 1 KB
- Streamhash.pdf ; 85 KB
- Streamhash.txt ; 1 KB
- Tangle.pdf ; 2.76 MB
- Tangle Observation.pdf ; 87 KB
- Thandra Khichidi.pdf ; 81 KB
- Tib3-pseudo.pdf ; 140 KB
- Twister.pdf ; 325 KB
- Twister attack.pdf ; 305 KB
- Vortex correlation.txt ; 1 KB
- Waterfall Specification 1.0.pdf ; 381 KB