NIST hash function design competition

Whyte, William WWhyte at ntru.com
Fri Jul 21 09:29:43 EDT 2006


Useful references are
http://cr.yp.to/antiforgery/cachetiming-20050414.pdf -- the Bernstein paper
www.wisdom.weizmann.ac.il/~tromer/papers/cache.pdf - related work by
  Eran Tromer.

William

> -----Original Message-----
> From: owner-cryptography at metzdowd.com 
> [mailto:owner-cryptography at metzdowd.com] On Behalf Of Travis H.
> Sent: Friday, July 21, 2006 9:09 AM
> To: Florian Weimer
> Cc: Hal Finney; jamesd at echeque.com; cryptography at metzdowd.com
> Subject: Re: NIST hash function design competition
> 
> On 7/20/06, Florian Weimer <fw at deneb.enyo.de> wrote:
> > Is this about Colin Percival's work?
> 
> The paper was by Dan Berstein; Percival's comments are specific to
> hyperthreading, but I think djb's research showed that it's applicable
> to non-HT architectures as well.
> -- 
> "Follow where reason leads" -- Zeno || Unix "guru" for rent or hire
> http://www.lightconsulting.com/~travis/ -><-
> GPG fingerprint: 9D3F 395A DAC5 5CCC 9066  151D 0A6B 4098 0C55 1484
> 
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to 
> majordomo at metzdowd.com
> 

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list