Over 10 Million Study Resources Now at Your Fingertips

Download as :
Rating : ⭐⭐⭐⭐⭐
Price : $10.99
Pages: 2

Keccak sponge function family main document

[41] H. Gilbert and H. Handschuh. Security analysis of sha-256 and sisters. Selected Areas in Cryptography, Lecture Notes in Computer Science, 3006:175–193, 2004.

[42] National Institute of Standards and Technology (NIST). SHA-3 Second Round Candidates. August 2009.

[47] Shai Halevi, William E Hall, and Charanjit S Jutla. The hash function fugue. Submission to NIST (updated), 2009.

[48] Praveen Gauravaram, Lars R Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schl¨affer, and Søren S Thomsen. Grøstl–a sha-3 candidate. Submission to NIST, 2008.

[53] Emmanuel Bresson, Anne Canteaut, Benoıt Chevallier-Mames, Christophe Clavier, Thomas Fuhr,
Aline Gouget, Thomas Icart, Jean-Franc¸ois Misarsky, Marıa Naya-Plasencia, Pascal Paillier, et al. Shabal, a submission to nist’s cryptographic hash algorithm competition. Submission to NIST, 2008.

[54] Eli Biham and Orr Dunkelman. The shavite-3 hash function. Submission to NIST, 9, 2008.


[58] Science and Technology Comittee. Forensic science on trial. pages 75–76, 2005.

[63] Rodrigo Rodrigues and Peter Druschel. Peer-to-peer systems. Communications of the ACM, 53(10):72–82, 2010.

[64] Cisco Systems Inc. Cisco visual networking index: Forecast and methodology, 2008-2013, July 2008.

[68] Adrian Adermon and Che-Yuan Liang. Piracy, music, and movies: A natural experiment. 2010.

[69] F. Moore. Ifpi digital music report 2012, 2012.

[72] Marc Fetscherin.


How It Works
Login account
Login Your Account
Add to cart
Add to Cart
Make payment
Document download
Download File
PageId: ELICB37631
Uploaded by :
Page 1 Preview
keccak sponge function family main document
Sell Your Old Documents & Earn Wallet Balance