Search results

Jump to navigation Jump to search
  • ...sses it down to a fixed bit-length (either 224, 256, 384 or 512 bits). The hash functions for the different output lengths are called Fugue-224, Fugue-256, ...e. It is also claimed to be competitive with the NIST hash function [[SHA hash functions|SHA-256]] in both software and hardware efficiency, achieving up ...
    3 KB (537 words) - 08:19, 26 January 2025
  • ...url=https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=932630 |website=nist.gov |publisher=[[National Institute of Standards and Technology]] |page=6 | ...]] (NIST) for future standardization of the lightweight cryptography.{{sfn|NIST|2023a}} ...
    8 KB (1,197 words) - 10:53, 27 November 2024
  • ...t|alt=Illustration of the sponge construction |The sponge construction for hash functions. ''P<sub>i</sub>'' are blocks of the input string, ''Z<sub>i</sub ...ryptographic hash]]es, [[message authentication codes]], [[mask generation function]]s, [[stream cipher]]s, [[pseudo-random number generator]]s, and [[authenti ...
    7 KB (988 words) - 02:38, 6 February 2025
  • {{Short description|Cryptographic hash function}} {{Infobox cryptographic hash function ...
    11 KB (1,708 words) - 18:39, 7 January 2025
  • ...aboratory|last=Computer Security Division|date=3 January 2017|website=Csrc.nist.gov|accessdate=14 November 2019}}</ref> and was used in [[Google]]'s [[CECP ...antum lattice-based ''compact'' signature scheme such as Falcon (GPV-style Hash-and-Sign paradigm) and [[BLISS signature scheme|BLISS]] (GLP-style [[Fiat–S ...
    4 KB (523 words) - 19:18, 13 February 2025
  • ...in Threefish-512. It also affects the [[Skein (hash function)|Skein]] hash function.<ref name=rotational-rebound/> ...part of the [[Skein hash function]], an entry in the [[NIST hash function competition]]. Threefish uses no [[S-box]]es or other table lookups in order to avoid c ...
    10 KB (1,423 words) - 06:34, 17 December 2024
  • ...structions of [[cryptographic primitive]]s based on the security of [[hash function]]s. It is of interest as a type of [[post-quantum cryptography]]. ...structure is used to this end. In this hierarchical data structure, a hash function and concatenation are used repeatedly to compute tree nodes. ...
    20 KB (2,880 words) - 23:48, 23 December 2024
  • ...verview of hash function security/[[cryptanalysis]] can be found at [[hash function security summary]]. Basic general information about the [[cryptographic hash function]]s: year, designer, references, etc. ...
    16 KB (1,865 words) - 21:08, 6 August 2024
  • {{Short description|Cryptographic hash function}} {{Infobox cryptographic hash function ...
    13 KB (1,961 words) - 23:56, 19 October 2024
  • {{Short description|Family of cryptographic hash functions}} {{Infobox cryptographic hash function ...
    19 KB (2,944 words) - 20:50, 12 August 2024
  • {{Short description|Set of cryptographic hash functions}} {{Infobox cryptographic hash function ...
    52 KB (7,730 words) - 18:17, 7 February 2025
  • {{Short description|Key derivative function}} ...5,<ref>{{Cite web|url=https://password-hashing.net/|title=Password Hashing Competition|website=password-hashing.net|access-date=2016-03-22}}</ref> which was won b ...
    18 KB (2,642 words) - 02:09, 24 December 2024