The NIST SHA-3 Competition: A Perspective on the Final Year
From MaRDI portal
Publication:3011930
DOI10.1007/978-3-642-21969-6_26zbMath1280.94092OpenAlexW2095867101MaRDI QIDQ3011930
Publication date: 29 June 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/343723
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Cryptanalysis of MD4
- Security Reductions of the Second Round SHA-3 Candidates
- Keying Hash Functions for Message Authentication
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- New directions in cryptography
- RIPEMD-160: A strengthened version of RIPEMD
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- On the Indifferentiability of the Sponge Construction
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- Fast Software Encryption
This page was built for publication: The NIST SHA-3 Competition: A Perspective on the Final Year