Login / Signup
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein.
Elena Andreeva
Bart Mennink
Bart Preneel
Marjan Skrobot
Published in:
AFRICACRYPT (2012)
Keyphrases
</>
security analysis
smart card
security requirements
public key
high security
security properties
encryption scheme
security model
authentication protocol
image encryption
user authentication
encryption algorithm
proxy signature scheme
multiresolution
video sequences
data structure
mutual authentication
real time