Long pages

From The ECRYPT Hash Function Website

Showing below up to 20 results in range #1 to #20.

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎SHA-3 Hardware Implementations Round Two ‎[177,798 bytes]
  2. (hist) ‎SHA-3 Hardware Implementations ‎[100,731 bytes]
  3. (hist) ‎SHA-3 Hardware Implementations Round One ‎[39,652 bytes]
  4. (hist) ‎Groestl ‎[35,880 bytes]
  5. (hist) ‎Skein ‎[21,723 bytes]
  6. (hist) ‎Generic Attacks ‎[21,634 bytes]
  7. (hist) ‎GenericAttacksHash ‎[21,634 bytes]
  8. (hist) ‎CubeHash ‎[18,773 bytes]
  9. (hist) ‎SHA-3 submitters ‎[17,383 bytes]
  10. (hist) ‎GenericAttacksMerkleDamgaard ‎[16,844 bytes]
  11. (hist) ‎ECHO ‎[16,416 bytes]
  12. (hist) ‎Keccak ‎[15,674 bytes]
  13. (hist) ‎MD4 ‎[15,109 bytes]
  14. (hist) ‎Blue Midnight Wish ‎[14,810 bytes]
  15. (hist) ‎SHA-256/224 ‎[14,206 bytes]
  16. (hist) ‎Hamsi ‎[14,128 bytes]
  17. (hist) ‎SHA-1 ‎[13,834 bytes]
  18. (hist) ‎JH ‎[12,505 bytes]
  19. (hist) ‎Luffa ‎[11,418 bytes]
  20. (hist) ‎BLAKE ‎[11,186 bytes]

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)