Uniform Evaluation of Hardware Implementations of the Round-Two SHA-3 Candidates

Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Original languageEnglish
Title of host publicationThe Second SHA-3 Candidate Conference, Santa Barbara, USA, August 23-24, 2010
Publisher.
Pages1-16
Publication statusPublished - 2010
Event2nd SHA-3 Candidate Conference - Santa Barbara, United States
Duration: 23 Aug 201024 Aug 2010

Conference

Conference2nd SHA-3 Candidate Conference
Country/TerritoryUnited States
CitySanta Barbara
Period23/08/1024/08/10

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Experimental
  • EU - ECRYPT II - European network of excellence in cryptology - Phase II

    Schmidt, J.-M. (Co-Investigator (CoI)), Nad, T. (Co-Investigator (CoI)), Kirschbaum, M. (Co-Investigator (CoI)), Feldhofer, M. (Co-Investigator (CoI)), Schläffer, M. (Co-Investigator (CoI)), Aigner, M. J. (Co-Investigator (CoI)), Rechberger, C. (Co-Investigator (CoI)), Lamberger, M. (Co-Investigator (CoI)), Tillich, S. (Co-Investigator (CoI)), Medwed, M. (Co-Investigator (CoI)), Hutter, M. (Co-Investigator (CoI)), Rijmen, V. (Co-Investigator (CoI)), Mendel, F. (Co-Investigator (CoI)) & Posch, R. (Principal Investigator (PI))

    1/08/0831/01/13

    Project: Research project

Cite this