Oldest pages
From The ECRYPT Hash Function Website
Showing below up to 50 results in range #41 to #90.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- SHA-512/384 (12:36, 10 November 2008)
- RC4-HASH (12:40, 10 November 2008)
- FFT-Hash I (12:48, 10 November 2008)
- FFT-Hash II (12:59, 10 November 2008)
- MD5 (13:20, 10 November 2008)
- GenericAttacksMerkleDamgaard (13:26, 10 November 2008)
- HashFunctions (22:28, 28 November 2008)
- SWIFFT (07:32, 2 December 2008)
- Waterfall (19:36, 29 December 2008)
- WaMM (19:43, 29 December 2008)
- Abacus (19:46, 29 December 2008)
- Tangle (19:50, 29 December 2008)
- StreamHash (19:52, 29 December 2008)
- Sgàil (19:56, 29 December 2008)
- Ponic (19:59, 29 December 2008)
- Boole (20:00, 29 December 2008)
- NKS2D (20:01, 29 December 2008)
- DCH (20:04, 29 December 2008)
- MeshHash (20:05, 29 December 2008)
- EnRUPT (20:13, 29 December 2008)
- HASH 2X (20:16, 29 December 2008)
- Blender (13:43, 8 January 2009)
- Khichidi-1 (07:18, 9 January 2009)
- CRUNCH (10:24, 14 January 2009)
- ZK-Crypt (11:21, 13 February 2009)
- NaSHA (13:48, 23 February 2009)
- SHAMATA (17:30, 24 February 2009)
- MD6 (15:16, 3 March 2009)
- SWIFFTX (12:06, 26 March 2009)
- AURORA (09:26, 27 March 2009)
- SANDstorm (08:52, 8 April 2009)
- ECOH (07:15, 11 April 2009)
- ARIRANG (13:24, 14 April 2009)
- Sarmal (17:00, 16 April 2009)
- Dynamic SHA2 (09:49, 3 May 2009)
- LUX (07:00, 5 May 2009)
- CHI (16:23, 11 May 2009)
- Dynamic SHA (11:57, 4 June 2009)
- MCSSHA-3 (14:06, 4 June 2009)
- Twister (09:16, 24 June 2009)
- HAS-160 (11:29, 9 July 2009)
- Whirlpool (11:30, 9 July 2009)
- Cheetah (06:29, 10 July 2009)
- FSB (SHA-3 submission) (12:20, 20 July 2009)
- Vortex (SHA-3 submission) (08:10, 22 July 2009)
- SHA-3 Hardware Implementations Round One (10:08, 28 July 2009)
- TIB3 (16:18, 29 July 2009)
- Lesamnta (08:16, 30 July 2009)
- Vortex (12:50, 30 July 2009)
- The Hash Function Zoo (12:53, 30 July 2009)