Hash3: Proofs, Analysis and Implementation : Report on ECRYPT II Event on Hash Functions

Publication: ResearchReport – Annual report year: 2009

Standard

Hash3: Proofs, Analysis and Implementation : Report on ECRYPT II Event on Hash Functions. / Gauravaram, Praveen.

2009. 11 p. (MAT REPORT; No. 2009-03).

Publication: ResearchReport – Annual report year: 2009

Harvard

APA

CBE

MLA

Vancouver

Author

Gauravaram, Praveen / Hash3: Proofs, Analysis and Implementation : Report on ECRYPT II Event on Hash Functions.

2009. 11 p. (MAT REPORT; No. 2009-03).

Publication: ResearchReport – Annual report year: 2009

Bibtex

@book{132d6509a4cc4931acb6f024304b2745,
title = "Hash3: Proofs, Analysis and Implementation",
author = "Praveen Gauravaram",
year = "2009",
volume = "MAT-REPORT no. 2009-03",
series = "MAT REPORT",

}

RIS

TY - RPRT

T1 - Hash3: Proofs, Analysis and Implementation

T2 - Report on ECRYPT II Event on Hash Functions

A1 - Gauravaram,Praveen

AU - Gauravaram,Praveen

PY - 2009

Y1 - 2009

N2 - This report outlines the talks presented at the winter school on Hash3: Proofs, Analysis, and Implementation, ECRYPT II Event on Hash Functions. In general, speakers may not write everything what they talk on the slides. So, this report also outlines such findings following the understanding of the author of this report. The author of this report would like to disclaim that any mistakes in this report are solely due to author of this report as not all of the technical details are verified with the speakers. The findings presented in this report are solely due to the author’s understanding of the talks at the winter school. For many of the talks, the author of this report has spent some time in understanding some technical details (using prior knowledge and (re)visiting the literature) and explained that in this report. Of course, not all the details are covered while exploring the literature.

AB - This report outlines the talks presented at the winter school on Hash3: Proofs, Analysis, and Implementation, ECRYPT II Event on Hash Functions. In general, speakers may not write everything what they talk on the slides. So, this report also outlines such findings following the understanding of the author of this report. The author of this report would like to disclaim that any mistakes in this report are solely due to author of this report as not all of the technical details are verified with the speakers. The findings presented in this report are solely due to the author’s understanding of the talks at the winter school. For many of the talks, the author of this report has spent some time in understanding some technical details (using prior knowledge and (re)visiting the literature) and explained that in this report. Of course, not all the details are covered while exploring the literature.

KW - cryptanalysis

KW - Hash functions

KW - implementation

KW - security proofs

BT - Hash3: Proofs, Analysis and Implementation

VL - MAT-REPORT no. 2009-03

T3 - MAT REPORT

T3 - en_GB

ER -