Extracts from the SHA-3 competition
From MaRDI portal
Publication:3455489
DOI10.1007/978-3-642-35999-6_6zbMATH Open1327.94070OpenAlexW1417050938MaRDI QIDQ3455489FDOQ3455489
Authors: Vincent Rijmen
Publication date: 4 December 2015
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-35999-6_6
Recommendations
- The State of Hash Functions and the NIST SHA-3 Competition
- The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
- The NIST SHA-3 Competition: A Perspective on the Final Year
- Cryptographic hash functions: theory and practice
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
Cites Work
- Careful with composition: limitations of the indifferentiability framework
- Security reductions of the second round SHA-3 candidates
- Biclique Cryptanalysis of the Full AES
- Cryptanalysis of MD4
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Advances in cryptology -- EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22--26, 2005. Proceedings
- Advances in cryptology -- CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14--18, 2005. Proceedings
Cited In (5)
Uses Software
This page was built for publication: Extracts from the SHA-3 competition
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3455489)