搜索结果: 1-6 共查到“军队指挥学 SHA-3 Candidate”相关记录6条 . 查询时间(0.125 秒)
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak
hash functions keccak sha-3
2012/3/28
In this short note we give an observation about the SHA- 3 candidate Keccak[r,c,d], where the parameters r,c and d receive values from the formal proposal for the Keccak hash function (with the hash o...
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak
hash functions keccak sha-3
2011/6/9
In this short note we give an observation about the SHA- 3 candidate Keccak[r,c,d], where the parameters r,c and d receive values from the formal proposal for the Keccak hash function (with the hash o...
A Compact FPGA Implementation of the SHA-3 Candidate ECHO
Implementation the SHA-3 Candidate ECHO
2010/7/14
We propose a compact architecture of the SHA-3 candidate ECHO for the Virtex-5 FPGA family. Our architecture is built around a 8-bit datapath. We show that a careful organization of the chaining varia...
FSBday:Implementing Wagner’s generalized birthday attack against the SHA-3 candidate FSB
SHA-3 Birthday FSB – Wagner
2009/6/23
The hash function FSB is one of the candidates submitted
to NIST’s competition to find the new standard hash function, SHA-3.
The compression function of FSB is based on error correcting codes. In
...
On Optimized FPGA Implementations of the SHA-3 Candidate Groestl
Cryptography hashfunction FPGA
2009/6/12
Actual and future developments of the automotive market
(e.g. the AUTOSAR project or car2car communication systems) will
increase the need for a suitable cryptographic infrastructure in modern
vehi...
Skein is a submission to the NIST SHA-3 hash function com-
petition which has been optimized towards implementation in modern
64-bit processor architectures. This paper investigates the performance
...