NIST hash function design competition
Whyte, William
WWhyte at ntru.com
Fri Jul 21 09:29:43 EDT 2006
Useful references are
http://cr.yp.to/antiforgery/cachetiming-20050414.pdf -- the Bernstein paper
www.wisdom.weizmann.ac.il/~tromer/papers/cache.pdf - related work by
Eran Tromer.
William
> -----Original Message-----
> From: owner-cryptography at metzdowd.com
> [mailto:owner-cryptography at metzdowd.com] On Behalf Of Travis H.
> Sent: Friday, July 21, 2006 9:09 AM
> To: Florian Weimer
> Cc: Hal Finney; jamesd at echeque.com; cryptography at metzdowd.com
> Subject: Re: NIST hash function design competition
>
> On 7/20/06, Florian Weimer <fw at deneb.enyo.de> wrote:
> > Is this about Colin Percival's work?
>
> The paper was by Dan Berstein; Percival's comments are specific to
> hyperthreading, but I think djb's research showed that it's applicable
> to non-HT architectures as well.
> --
> "Follow where reason leads" -- Zeno || Unix "guru" for rent or hire
> http://www.lightconsulting.com/~travis/ -><-
> GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484
>
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to
> majordomo at metzdowd.com
>
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list