Keccak sponge function family main document
[41] H. Gilbert and H. Handschuh. Security analysis of sha-256 and sisters. Selected Areas in Cryptography, Lecture Notes in Computer Science, 3006:175–193, 2004.
[42] National Institute of Standards and Technology (NIST). SHA-3 Second Round Candidates. August 2009.
[47] Shai Halevi, William E Hall, and Charanjit S Jutla. The hash function fugue. Submission to NIST (updated), 2009.
[48] Praveen Gauravaram, Lars R Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schl¨affer, and Søren S Thomsen. Grøstl–a sha-3 candidate. Submission to NIST, 2008.
[53] Emmanuel Bresson, Anne Canteaut, Benoıt Chevallier-Mames, Christophe Clavier, Thomas Fuhr,
Aline Gouget, Thomas Icart, Jean-Franc¸ois Misarsky, Marıa Naya-Plasencia, Pascal Paillier, et al. Shabal, a submission to nist’s cryptographic hash algorithm competition. Submission to NIST, 2008.[54] Eli Biham and Orr Dunkelman. The shavite-3 hash function. Submission to NIST, 9, 2008.
http://nvlpubs.nist.gov/nistpubs/ir/
[58] Science and Technology Comittee. Forensic science on trial. pages 75–76, 2005.
[63] Rodrigo Rodrigues and Peter Druschel. Peer-to-peer systems. Communications of the ACM, 53(10):72–82, 2010.
[64] Cisco Systems Inc. Cisco visual networking index: Forecast and methodology, 2008-2013, July 2008.
[68] Adrian Adermon and Che-Yuan Liang. Piracy, music, and movies: A natural experiment. 2010.
[69] F. Moore. Ifpi digital music report 2012, 2012.
[72] Marc Fetscherin. | |
---|---|
166