Modern Cryptography: Applied Mathematics for Encryption and Information Security by Easttom Chuck

Modern Cryptography: Applied Mathematics for Encryption and Information Security by Easttom Chuck

Author:Easttom, Chuck
Language: eng
Format: epub, azw3
Publisher: McGraw-Hill Education
Published: 2015-10-08T16:00:00+00:00


Note

This is a generic overview of the essentials of a sponge construction; there can be variations on this process. The details of the function F will vary with specific implementations. In SHA-3, the state consists of a 5 × 5 array of 64-bit words, 1600 bits total. The authors claim 12.5 cycles per byte on an Intel Core 2 CPU. In hardware implementations, it was notably faster than all other finalists. The permutations of SHA-3 that were approved by the NIST include 224-, 256-, 384-, and 512-bit outputs.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.