Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
5Activity
0 of .
Results for:
No results containing your search query
P. 1
The MD6 Hash Function

The MD6 Hash Function

Ratings:

5.0

(3)
|Views: 1,349|Likes:
Published by Chris Nash
Ron Rivest's proposal for a modern cryptographically secure hash function.
Ron Rivest's proposal for a modern cryptographically secure hash function.

More info:

Published by: Chris Nash on Oct 29, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

06/10/2013

pdf

text

original

 
 The MD6 Hash FunctionRonald L. RivestMIT CSAIL
CRYPTO 2008
(aka “Pumpkin Hash”)
 
MD6 Team
x
Dan Bailey
x
Sarah Cheng
x
Christopher Crutchfield
x
 Yevgeniy Dodis
x
Elliott Fleming
x
Asif Khan
x
 Jayant Krishnamurthy
x
 Yuncheng Lin
x
Leo Reyzin
x
Emily Shen
x
 Jim Sukha
x
Eran Tromer
x
 Yiqun Lisa Yin
x
 Juniper Networks
x
Cilk Arts
x
NSF
 
Outline
x
Introduction
x
Design considerations
x
Mode of Operation
x
Compression Function
x
Software Implementations
x
Hardware Implementations
x
Security Analysis

Activity (5)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
vijaykannamalla liked this
bhbatson liked this
banben liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->