Search results

From The ECRYPT Hash Function Website
  • author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, author = {Norbert Pramstaller and Christian Rechberger and Vincent Rijmen},
    14 KB (1,855 words) - 11:34, 10 November 2008
  • author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Marcin Kontak and Janusz Szmidt}, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger},
    4 KB (604 words) - 12:03, 10 November 2008
  • author = {Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, author = {Mario Lamberger and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen},
    3 KB (444 words) - 14:17, 27 March 2008
  • author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen},
    3 KB (376 words) - 14:16, 27 March 2008
  • author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger},
    5 KB (727 words) - 10:47, 12 March 2008
  • author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen},
    14 KB (1,891 words) - 10:08, 18 September 2009
  • author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen},
    3 KB (376 words) - 14:18, 27 March 2008
  • [20] Markus Bernet, Luca Henzen, Hubert Kaeslin, Norbert Felber, and Wolfgang Fichtner. Hardware Implementations of the SHA-3 Candid
    98 KB (12,303 words) - 12:49, 23 May 2012
  • [20] Markus Bernet, Luca Henzen, Hubert Kaeslin, Norbert Felber, and Wolfgang Fichtner. Hardware Implementations of the SHA-3 Candid
    174 KB (21,401 words) - 14:19, 22 May 2012