Welcome Guest Log In | Register

Recent Contributions to Cryptographic Hash Functions

Authored on: Jul 8, 2010 by Shay Gueron et al

Technical Paper

0
More InfoLess Info

In this article, we provide the background to understand what a hash function is and what problems it addresses. We then describe and contrast two radically different designs entered in the NIST competition, Skein and Vortex.

View
 

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page