Report on post-quantum cryptography / / Lily Chen; Stephen Jordan; Yi-Kai Liu; Dustin Moody; Rene Peralta; Ray Perlner; Daniel Smith-Tone
| Report on post-quantum cryptography / / Lily Chen; Stephen Jordan; Yi-Kai Liu; Dustin Moody; Rene Peralta; Ray Perlner; Daniel Smith-Tone |
| Autore | Chen Lily |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 |
| Descrizione fisica | 1 online resource (15 pages) : illustrations (black and white) |
| Altri autori (Persone) |
ChenLily
JordanStephen LiuYi-Kai MoodyDustin PeraltaRené PerlnerRay Smith-ToneDaniel |
| Collana | NISTIR |
| Soggetto topico |
Public key cryptography
Quantum computing |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910709596903321 |
Chen Lily
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Status report on the first round of the SHA-3 cryptographic hash algorithm competition / / Andrew Regenscheid; Ray Perlner; Shu-jen Chang; John Kelsey; Mridul Nandi; Souradyuti Paul
| Status report on the first round of the SHA-3 cryptographic hash algorithm competition / / Andrew Regenscheid; Ray Perlner; Shu-jen Chang; John Kelsey; Mridul Nandi; Souradyuti Paul |
| Autore | Regenscheid Andrew |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2009 |
| Descrizione fisica | 1 online resource |
| Altri autori (Persone) |
ZhangShuoren
KelseyJohn NandiMridul PaulSouradyuti PerlnerRay RegenscheidAndrew |
| Collana | NISTIR |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910710749703321 |
Regenscheid Andrew
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Status report on the second round of the SHA-3 cryptographic hash algorithm competition / / Meltem Sonmez Turan; Ray Perlner; Lawrence E. Bassham; William Burr; Donghoon Chang; Shu-jen Chang; Morris J. Dworkin; John M. Kelsey; Souradyuti Paul; Rene Peralta
| Status report on the second round of the SHA-3 cryptographic hash algorithm competition / / Meltem Sonmez Turan; Ray Perlner; Lawrence E. Bassham; William Burr; Donghoon Chang; Shu-jen Chang; Morris J. Dworkin; John M. Kelsey; Souradyuti Paul; Rene Peralta |
| Autore | Turan Meltem Sonmez |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2011 |
| Descrizione fisica | 1 online resource |
| Altri autori (Persone) |
BasshamLawrence E
BurrWilliam ChangDonghoon ZhangShuoren DworkinMorris J KelseyJohn M PaulSouradyuti PeraltaRené PerlnerRay TuranMeltem Sonmez |
| Collana | NISTIR |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910710741103321 |
Turan Meltem Sonmez
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||