Design Con 2015
Welcome Guest Log In | Register

Recent Contributions to Cryptographic Hash Functions

Authored on: Jul 8, 2010 by Shay Gueron et al

Technical Paper

0 0
More InfoLess Info

In this article, we provide the background to understand what a hash function is and what problems it addresses. We then describe and contrast two radically different designs entered in the NIST competition, Skein and Vortex.

View
 
0 comments
write a comment

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page