519:
21:
328:
578:
203:
72:
56:
806:
105:
826:
822:
818:
125:
121:
117:
814:
113:
61:
46:
682:
51:
22:
83:
91:
399:
366:
333:
780:
241:
465:
182:
649:
792:
775:
327:
785:
almost any other application. Ignat
Korchagin. "Speeding up Linux disk encryption". 2020. JP
498:
752:
691:
Luca Henzen Willi Meier
Raphael C.-W. Phan ChaCha20 Website Specification BLAKE2 2012 Jean-Philippe
524:
87:
307:
274:
94:, but consider checking the search results below to see whether the topic is already covered.
741:
719:
708:
671:
638:
605:
546:
487:
454:
421:
388:
355:
296:
263:
230:
171:
138:
728:, Jean-Philippe (2017). Serious Cryptography. No Starch Press. p. 24. ISBN 9781593278267...
408:. "The Password Hashing Competition: Motivation, Challenges, and Organization"...
557:
8:
625:, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi (2009). "Cube Testers...
432:
724:"Real-World Relativity: The GPS Navigation System" Accessed 30 June 2012.
658:
2017, p. 56. Daemen & Rijmen 2013, p. 74. Biryukov & Wagner 1999. Shannon...
583:
437:
certificates business to Thoma Bravo: sources". Reuters. Retrieved 2018-01-08.
371:
Universal
Hashing". CFRG Working Group. Retrieved 16 March 2010. Jean-Philippe
375:& Daniel J. Bernstein (18 September 2012). "SipHash: a fast short-input...
208:
149:
404:"Auckland Uni scientist judge in password contest". 2013. Jean-Philippe
588:"OpenSSL 1.1.0 series notes". GitHub. Retrieved December 6, 2022. J-P.
518:
507:
and Daniel J. Bernstein's SipHash (2012) is the most widely-used hash function...
474:, Luca Henzen, Willi Meier and María Naya-Plasencia. Quark was created because...
246:
Iterative Hash
Functions – HAIFA". Cryptology ePrint Archive. Jean-Philippe
11:
529:
prononcées à la chambre de commerce de Dakar le 4 avril 1941 par MM. Chamussuy,
757:
resulting in a distinguisher with 2247 complexity discovered by Jean-Philippe
316:
discovered several sets of weak states. The fourth presented (and smallest)...
158:
and Daniel J. Bernstein in 2012,: 165 in response to a spate of "hash...
283:
draws the line between practical and impractical attacks at 280 operations...
250:, Samuel Neves, Zooko Wilcox-O’Hearn, and Christian Winnerlein (3 December...
616:
217:, Fischer, Khazaei, Meier, and Rechberger reported a cryptanalytic attack...
28:
761:
in
December 2006. Even though this distinguisher was improved to 2158 in...
338:
BLAKE, was announced on
December 21, 2012. It was created by Jean-Philippe
187:
BLAKE was submitted to the NIST hash function competition by Jean-Philippe
533:
et
Boisson. Dakar: Grande imprimerie africaine, 1941. Free French order...
441:, J.P. (2017). Serious Cryptography: A Practical Introduction to Modern...
342:, Samuel Neves, Zooko Wilcox-O'Hearn, and Christian Winnerlein with the...
191:, Luca Henzen, Willi Meier, and Raphael C.-W. Phan. In 2008, there were...
789:. "Lazy crypto reloaded". "You Don't Want XTS". 2014.
592:(October 2015). M-J. Saarinen (ed.). The BLAKE2 Cryptographic Hash and...
566:
and Daniel J. Bernstein were able to show that even implementations of...
654:
of the full cipher starts out as a success against a reduced-round one.
312:
had no practical impact on the security of ISAAC. In 2006 Jean-Philippe
279:
the researchers estimate only $ 11,000 was needed to find a collision).
562:
such a way so as to intentionally cause hash collisions. Jean-Philippe
503:
easier to compute than cryptographic hashes. As of 2021, Jean-Philippe
470:
cryptographic hash function (family). It was designed by Jean-Philippe
621:
Archived from the original (PDF) on 2017-08-12. Retrieved 2024-01-29.
213:
does not seem to be competitive with the brute force attack. In 2008,
154:(ARX) based family of pseudorandom functions created by Jean-Philippe
773:
745:
712:
675:
642:
609:
550:
491:
458:
425:
392:
359:
300:
267:
234:
175:
142:
38:
577:
202:
39:
40:
746:
713:
676:
643:
610:
551:
492:
459:
426:
393:
360:
301:
268:
235:
176:
143:
740:
707:
670:
637:
604:
545:
486:
453:
420:
387:
354:
295:
262:
229:
170:
137:
569:17 KB (1,396 words) - 06:34, 28 September 2024
345:48 KB (6,228 words) - 13:24, 27 September 2024
536:17 KB (1,805 words) - 20:58, 9 September 2024
731:8 KB (1,073 words) - 20:05, 26 February 2024
764:5 KB (640 words) - 06:33, 27 September 2023
595:51 KB (4,697 words) - 00:56, 15 August 2024
194:30 KB (2,848 words) - 05:59, 18 August 2024
161:14 KB (1,342 words) - 05:08, 21 August 2024
683:Comparison of cryptographic hash functions
411:3 KB (254 words) - 01:08, 11 October 2023
378:15 KB (1,790 words) - 04:23, 31 July 2024
319:5 KB (546 words) - 02:33, 17 October 2023
220:31 KB (3,574 words) - 01:57, 24 July 2024
771:
698:16 KB (806 words) - 20:08, 6 August 2024
510:17 KB (2,010 words) - 21:48, 17 May 2024
286:13 KB (1,360 words) - 04:38, 10 May 2024
628:6 KB (493 words) - 20:54, 7 August 2024
253:10 KB (280 words) - 10:21, 23 June 2024
88:create a draft and submit it for review
12:
661:8 KB (937 words) - 04:23, 5 July 2023
477:2 KB (177 words) - 01:36, 19 May 2024
444:7 KB (668 words) - 02:16, 5 July 2024
9:
92:request that a redirect be created
839:
781:Cryptography/full-disk encryption
739:
706:
669:
636:
603:
544:
485:
452:
419:
386:
353:
294:
261:
228:
169:
136:
16:
1:
400:Password Hashing Competition
7:
367:Message authentication code
334:Cryptographic hash function
844:
86:" does not exist. You can
776:Textbooks from Wikibooks
743:image layout frameless
710:image layout frameless
673:image layout frameless
640:image layout frameless
607:image layout frameless
548:image layout frameless
489:image layout frameless
456:image layout frameless
423:image layout frameless
390:image layout frameless
357:image layout frameless
298:image layout frameless
265:image layout frameless
232:image layout frameless
173:image layout frameless
140:image layout frameless
242:List of hash functions
695:Samuel Neves Zooko...
466:Quark (hash function)
183:BLAKE (hash function)
650:Round (cryptography)
687:2008 Jean-Philippe
36:
32:
744:
711:
674:
641:
608:
549:
490:
457:
424:
391:
358:
299:
266:
233:
174:
141:
34:
30:
17:
835:
812:
804:
788:
760:
742:
727:
709:
694:
690:
672:
657:
639:
624:
606:
591:
565:
547:
532:
506:
499:Collision attack
488:
473:
455:
440:
422:
407:
389:
374:
356:
341:
315:
297:
282:
264:
249:
231:
216:
190:
172:
157:
139:
111:
103:
68:
18:
843:
842:
838:
837:
836:
834:
833:
832:
831:
830:
810:
802:
798:
795:
793:See all results
790:
786:
783:
778:
770:
767:
766:
765:
762:
758:
755:
753:Rabbit (cipher)
749:
748:
747:
734:
733:
732:
729:
725:
722:
716:
715:
714:
701:
700:
699:
696:
692:
688:
685:
679:
678:
677:
664:
663:
662:
659:
655:
652:
646:
645:
644:
631:
630:
629:
626:
622:
619:
613:
612:
611:
598:
597:
596:
593:
589:
586:
580:
572:
571:
570:
567:
563:
560:
554:
553:
552:
539:
538:
537:
534:
530:
527:
525:Battle of Gabon
521:
513:
512:
511:
508:
504:
501:
495:
494:
493:
480:
479:
478:
475:
471:
468:
462:
461:
460:
447:
446:
445:
442:
438:
435:
429:
428:
427:
414:
413:
412:
409:
405:
402:
396:
395:
394:
381:
380:
379:
376:
372:
369:
363:
362:
361:
348:
347:
346:
343:
339:
336:
330:
322:
321:
320:
317:
313:
310:
304:
303:
302:
289:
288:
287:
284:
280:
277:
271:
270:
269:
256:
255:
254:
251:
247:
244:
238:
237:
236:
223:
222:
221:
218:
214:
211:
205:
197:
196:
195:
192:
188:
185:
179:
178:
177:
164:
163:
162:
159:
155:
152:
146:
145:
144:
130:
129:
109:
101:
97:
77:
69:
67:
66:
41:
37:
27:
26:
25:
24:
23:
15:
5:
841:
800:
799:
797:
796:
791:
784:
779:
774:
769:
768:
763:
756:
751:
750:
738:
737:
735:
730:
723:
718:
717:
705:
704:
702:
697:
686:
681:
680:
668:
667:
665:
660:
653:
648:
647:
635:
634:
632:
627:
620:
615:
614:
602:
601:
599:
594:
587:
582:
581:
576:
575:
573:
568:
561:
556:
555:
543:
542:
540:
535:
528:
523:
522:
517:
516:
514:
509:
502:
497:
496:
484:
483:
481:
476:
469:
464:
463:
451:
450:
448:
443:
436:
431:
430:
418:
417:
415:
410:
403:
398:
397:
385:
384:
382:
377:
370:
365:
364:
352:
351:
349:
344:
337:
332:
331:
326:
325:
323:
318:
311:
308:ISAAC (cipher)
306:
305:
293:
292:
290:
285:
278:
275:Security level
273:
272:
260:
259:
257:
252:
245:
240:
239:
227:
226:
224:
219:
212:
207:
206:
201:
200:
198:
193:
186:
181:
180:
168:
167:
165:
160:
153:
148:
147:
135:
134:
131:
99:
98:
79:
78:
75:
71:Did you mean:
70:
65:
64:
59:
54:
49:
43:
42:
20:
19:
14:
13:
10:
6:
4:
3:
2:
840:
828:
824:
820:
816:
808:
794:
782:
777:
772:
754:
736:
721:
703:
684:
666:
651:
633:
618:
600:
585:
579:
574:
559:
541:
526:
520:
515:
500:
482:
467:
449:
434:
416:
401:
383:
368:
350:
335:
329:
324:
309:
291:
276:
258:
243:
225:
210:
204:
199:
184:
166:
151:
133:
132:
127:
123:
119:
115:
107:
96:
95:
93:
89:
85:
76:
73:
63:
60:
58:
55:
53:
50:
48:
47:Content pages
45:
44:
81:
80:
803:previous 20
720:Clock drift
102:previous 20
558:MurmurHash
82:The page "
57:Everything
52:Multimedia
787:Aumasson
759:Aumasson
726:Aumasson
693:Aumasson
689:Aumasson
656:Aumasson
623:Aumasson
590:Aumasson
564:Aumasson
531:Aumasson
505:Aumasson
472:Aumasson
439:Aumasson
433:GeoTrust
406:Aumasson
373:Aumasson
340:Aumasson
314:Aumasson
281:Aumasson
248:Aumasson
215:Aumasson
189:Aumasson
156:Aumasson
84:Aumasson
74:aucassin
62:Advanced
29:Results
807:next 20
584:OpenSSL
209:Salsa20
150:SipHash
106:next 20
801:View (
100:View (
31:1 – 20
827:500
823:250
819:100
809:) (
805:|
617:MD6
126:500
122:250
118:100
108:) (
104:|
90:or
33:of
825:|
821:|
817:|
815:50
813:|
811:20
124:|
120:|
116:|
114:50
112:|
110:20
35:36
829:)
128:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.