Troika: a ternary cryptographic hash function
From MaRDI portal
Publication:2285779
Recommendations
Cites Work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 607286 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- scientific article; zbMATH DE number 1406761 (Why is no real title available?)
- scientific article; zbMATH DE number 1418257 (Why is no real title available?)
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- A New Family of Ternary Almost Perfect Nonlinear Mappings
- Differential cryptanalysis of DES-like cryptosystems
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- Keccak
- Linear frameworks for block ciphers
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- On the Indifferentiability of the Sponge Construction
- Optimal ternary linear codes
- Optimal ternary quasi-cyclic codes
- PRESENT: An Ultra-Lightweight Block Cipher
- Piccolo: An Ultra-Lightweight Blockcipher
- Proving resistance against invariant attacks: how to choose the round constants
- Pseudorandom Permutation Families over Abelian Groups
- Sponge-based pseudo-random number generators
- Ternary self-orthogonal codes of dual distance three and ternary quantum codes of distance three
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Three-weight ternary linear codes from a family of cyclic difference sets
Cited In (4)
This page was built for publication: Troika: a ternary cryptographic hash function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2285779)