Keccak
- 1 January 2013
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- KeccakLecture Notes in Computer Science, 2013
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm CompetitionPublished by National Institute of Standards and Technology (NIST) ,2012
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other ApplicationsLecture Notes in Computer Science, 2012
- On the Indifferentiability of the Sponge ConstructionLecture Notes in Computer Science, 2008
- Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle MethodologyLecture Notes in Computer Science, 2004
- The Design of RijndaelInformation Security and Cryptography, 2002