Knowledge

Aumasson - Search results

Source 📝

519: 21: 328: 578: 203: 72: 56: 806: 105: 826: 822: 818: 125: 121: 117: 814: 113: 61: 46: 682: 51: 22: 83: 91: 399: 366: 333: 780: 241: 465: 182: 649: 792: 775: 327: 785:
almost any other application. Ignat Korchagin. "Speeding up Linux disk encryption". 2020. JP
498: 752: 691:
Luca Henzen Willi Meier Raphael C.-W. Phan ChaCha20 Website Specification BLAKE2 2012 Jean-Philippe
524: 87: 307: 274: 94:, but consider checking the search results below to see whether the topic is already covered. 741: 719: 708: 671: 638: 605: 546: 487: 454: 421: 388: 355: 296: 263: 230: 171: 138: 728:, Jean-Philippe (2017). Serious Cryptography. No Starch Press. p. 24. ISBN 9781593278267... 408:. "The Password Hashing Competition: Motivation, Challenges, and Organization"... 557: 8: 625:, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi (2009). "Cube Testers... 432: 724:"Real-World Relativity: The GPS Navigation System" Accessed 30 June 2012. 658:
2017, p. 56. Daemen & Rijmen 2013, p. 74. Biryukov & Wagner 1999. Shannon...
583: 437:
certificates business to Thoma Bravo: sources". Reuters. Retrieved 2018-01-08.
371:
Universal Hashing". CFRG Working Group. Retrieved 16 March 2010. Jean-Philippe
375:& Daniel J. Bernstein (18 September 2012). "SipHash: a fast short-input... 208: 149: 404:"Auckland Uni scientist judge in password contest". 2013. Jean-Philippe 588:"OpenSSL 1.1.0 series notes". GitHub. Retrieved December 6, 2022. J-P. 518: 507:
and Daniel J. Bernstein's SipHash (2012) is the most widely-used hash function...
474:, Luca Henzen, Willi Meier and María Naya-Plasencia. Quark was created because... 246:
Iterative Hash Functions – HAIFA". Cryptology ePrint Archive. Jean-Philippe
11: 529:
prononcées à la chambre de commerce de Dakar le 4 avril 1941 par MM. Chamussuy,
757:
resulting in a distinguisher with 2247 complexity discovered by Jean-Philippe
316:
discovered several sets of weak states. The fourth presented (and smallest)...
158:
and Daniel J. Bernstein in 2012,: 165  in response to a spate of "hash...
283:
draws the line between practical and impractical attacks at 280 operations...
250:, Samuel Neves, Zooko Wilcox-O’Hearn, and Christian Winnerlein (3 December... 616: 217:, Fischer, Khazaei, Meier, and Rechberger reported a cryptanalytic attack... 28: 761:
in December 2006. Even though this distinguisher was improved to 2158 in...
338:
BLAKE, was announced on December 21, 2012. It was created by Jean-Philippe
187:
BLAKE was submitted to the NIST hash function competition by Jean-Philippe
533:
et Boisson. Dakar: Grande imprimerie africaine, 1941. Free French order...
441:, J.P. (2017). Serious Cryptography: A Practical Introduction to Modern... 342:, Samuel Neves, Zooko Wilcox-O'Hearn, and Christian Winnerlein with the... 191:, Luca Henzen, Willi Meier, and Raphael C.-W. Phan. In 2008, there were... 789:. "Lazy crypto reloaded". "You Don't Want XTS". 2014. 592:(October 2015). M-J. Saarinen (ed.). The BLAKE2 Cryptographic Hash and... 566:
and Daniel J. Bernstein were able to show that even implementations of...
654:
of the full cipher starts out as a success against a reduced-round one.
312:
had no practical impact on the security of ISAAC. In 2006 Jean-Philippe
279:
the researchers estimate only $ 11,000 was needed to find a collision).
562:
such a way so as to intentionally cause hash collisions. Jean-Philippe
503:
easier to compute than cryptographic hashes. As of 2021, Jean-Philippe
470:
cryptographic hash function (family). It was designed by Jean-Philippe
621:
Archived from the original (PDF) on 2017-08-12. Retrieved 2024-01-29.
213:
does not seem to be competitive with the brute force attack. In 2008,
154:(ARX) based family of pseudorandom functions created by Jean-Philippe 773: 745: 712: 675: 642: 609: 550: 491: 458: 425: 392: 359: 300: 267: 234: 175: 142: 38: 577: 202: 39: 40: 746: 713: 676: 643: 610: 551: 492: 459: 426: 393: 360: 301: 268: 235: 176: 143: 740: 707: 670: 637: 604: 545: 486: 453: 420: 387: 354: 295: 262: 229: 170: 137: 569:17 KB (1,396 words) - 06:34, 28 September 2024 345:48 KB (6,228 words) - 13:24, 27 September 2024 536:17 KB (1,805 words) - 20:58, 9 September 2024 731:8 KB (1,073 words) - 20:05, 26 February 2024 764:5 KB (640 words) - 06:33, 27 September 2023 595:51 KB (4,697 words) - 00:56, 15 August 2024 194:30 KB (2,848 words) - 05:59, 18 August 2024 161:14 KB (1,342 words) - 05:08, 21 August 2024 683:Comparison of cryptographic hash functions 411:3 KB (254 words) - 01:08, 11 October 2023 378:15 KB (1,790 words) - 04:23, 31 July 2024 319:5 KB (546 words) - 02:33, 17 October 2023 220:31 KB (3,574 words) - 01:57, 24 July 2024 771: 698:16 KB (806 words) - 20:08, 6 August 2024 510:17 KB (2,010 words) - 21:48, 17 May 2024 286:13 KB (1,360 words) - 04:38, 10 May 2024 628:6 KB (493 words) - 20:54, 7 August 2024 253:10 KB (280 words) - 10:21, 23 June 2024 88:create a draft and submit it for review 12: 661:8 KB (937 words) - 04:23, 5 July 2023 477:2 KB (177 words) - 01:36, 19 May 2024 444:7 KB (668 words) - 02:16, 5 July 2024 9: 92:request that a redirect be created 839: 781:Cryptography/full-disk encryption 739: 706: 669: 636: 603: 544: 485: 452: 419: 386: 353: 294: 261: 228: 169: 136: 16: 1: 400:Password Hashing Competition 7: 367:Message authentication code 334:Cryptographic hash function 844: 86:" does not exist. You can 776:Textbooks from Wikibooks 743:image layout frameless 710:image layout frameless 673:image layout frameless 640:image layout frameless 607:image layout frameless 548:image layout frameless 489:image layout frameless 456:image layout frameless 423:image layout frameless 390:image layout frameless 357:image layout frameless 298:image layout frameless 265:image layout frameless 232:image layout frameless 173:image layout frameless 140:image layout frameless 242:List of hash functions 695:Samuel Neves Zooko... 466:Quark (hash function) 183:BLAKE (hash function) 650:Round (cryptography) 687:2008 Jean-Philippe 36: 32: 744: 711: 674: 641: 608: 549: 490: 457: 424: 391: 358: 299: 266: 233: 174: 141: 34: 30: 17: 835: 812: 804: 788: 760: 742: 727: 709: 694: 690: 672: 657: 639: 624: 606: 591: 565: 547: 532: 506: 499:Collision attack 488: 473: 455: 440: 422: 407: 389: 374: 356: 341: 315: 297: 282: 264: 249: 231: 216: 190: 172: 157: 139: 111: 103: 68: 18: 843: 842: 838: 837: 836: 834: 833: 832: 831: 830: 810: 802: 798: 795: 793:See all results 790: 786: 783: 778: 770: 767: 766: 765: 762: 758: 755: 753:Rabbit (cipher) 749: 748: 747: 734: 733: 732: 729: 725: 722: 716: 715: 714: 701: 700: 699: 696: 692: 688: 685: 679: 678: 677: 664: 663: 662: 659: 655: 652: 646: 645: 644: 631: 630: 629: 626: 622: 619: 613: 612: 611: 598: 597: 596: 593: 589: 586: 580: 572: 571: 570: 567: 563: 560: 554: 553: 552: 539: 538: 537: 534: 530: 527: 525:Battle of Gabon 521: 513: 512: 511: 508: 504: 501: 495: 494: 493: 480: 479: 478: 475: 471: 468: 462: 461: 460: 447: 446: 445: 442: 438: 435: 429: 428: 427: 414: 413: 412: 409: 405: 402: 396: 395: 394: 381: 380: 379: 376: 372: 369: 363: 362: 361: 348: 347: 346: 343: 339: 336: 330: 322: 321: 320: 317: 313: 310: 304: 303: 302: 289: 288: 287: 284: 280: 277: 271: 270: 269: 256: 255: 254: 251: 247: 244: 238: 237: 236: 223: 222: 221: 218: 214: 211: 205: 197: 196: 195: 192: 188: 185: 179: 178: 177: 164: 163: 162: 159: 155: 152: 146: 145: 144: 130: 129: 109: 101: 97: 77: 69: 67: 66: 41: 37: 27: 26: 25: 24: 23: 15: 5: 841: 800: 799: 797: 796: 791: 784: 779: 774: 769: 768: 763: 756: 751: 750: 738: 737: 735: 730: 723: 718: 717: 705: 704: 702: 697: 686: 681: 680: 668: 667: 665: 660: 653: 648: 647: 635: 634: 632: 627: 620: 615: 614: 602: 601: 599: 594: 587: 582: 581: 576: 575: 573: 568: 561: 556: 555: 543: 542: 540: 535: 528: 523: 522: 517: 516: 514: 509: 502: 497: 496: 484: 483: 481: 476: 469: 464: 463: 451: 450: 448: 443: 436: 431: 430: 418: 417: 415: 410: 403: 398: 397: 385: 384: 382: 377: 370: 365: 364: 352: 351: 349: 344: 337: 332: 331: 326: 325: 323: 318: 311: 308:ISAAC (cipher) 306: 305: 293: 292: 290: 285: 278: 275:Security level 273: 272: 260: 259: 257: 252: 245: 240: 239: 227: 226: 224: 219: 212: 207: 206: 201: 200: 198: 193: 186: 181: 180: 168: 167: 165: 160: 153: 148: 147: 135: 134: 131: 99: 98: 79: 78: 75: 71:Did you mean: 70: 65: 64: 59: 54: 49: 43: 42: 20: 19: 14: 13: 10: 6: 4: 3: 2: 840: 828: 824: 820: 816: 808: 794: 782: 777: 772: 754: 736: 721: 703: 684: 666: 651: 633: 618: 600: 585: 579: 574: 559: 541: 526: 520: 515: 500: 482: 467: 449: 434: 416: 401: 383: 368: 350: 335: 329: 324: 309: 291: 276: 258: 243: 225: 210: 204: 199: 184: 166: 151: 133: 132: 127: 123: 119: 115: 107: 96: 95: 93: 89: 85: 76: 73: 63: 60: 58: 55: 53: 50: 48: 47:Content pages 45: 44: 81: 80: 803:previous 20 720:Clock drift 102:previous 20 558:MurmurHash 82:The page " 57:Everything 52:Multimedia 787:Aumasson 759:Aumasson 726:Aumasson 693:Aumasson 689:Aumasson 656:Aumasson 623:Aumasson 590:Aumasson 564:Aumasson 531:Aumasson 505:Aumasson 472:Aumasson 439:Aumasson 433:GeoTrust 406:Aumasson 373:Aumasson 340:Aumasson 314:Aumasson 281:Aumasson 248:Aumasson 215:Aumasson 189:Aumasson 156:Aumasson 84:Aumasson 74:aucassin 62:Advanced 29:Results 807:next 20 584:OpenSSL 209:Salsa20 150:SipHash 106:next 20 801:View ( 100:View ( 31:1 – 20 827:500 823:250 819:100 809:) ( 805:| 617:MD6 126:500 122:250 118:100 108:) ( 104:| 90:or 33:of 825:| 821:| 817:| 815:50 813:| 811:20 124:| 120:| 116:| 114:50 112:| 110:20 35:36 829:) 128:)

Index

Content pages
Multimedia
Everything
Advanced
aucassin
Aumasson
create a draft and submit it for review
request that a redirect be created

50
100
250
500
SipHash
BLAKE (hash function)
Thumbnail for Salsa20
Salsa20
List of hash functions
Security level
ISAAC (cipher)
Thumbnail for Cryptographic hash function
Cryptographic hash function
Message authentication code
Password Hashing Competition
GeoTrust
Quark (hash function)
Collision attack
Thumbnail for Battle of Gabon
Battle of Gabon
MurmurHash

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.