Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,232,777 papers from all fields of science
Search
Sign In
Create Free Account
NaSHA
Known as:
NaSHA (hash function)
NaSHA is a hash function accepted as a first round SHA-3 candidate for the NIST hash function competition. NaSHA was designed by Smile Markovski and…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
4 relations
Collision attack
Cycles per byte
Hash function
NIST hash function competition
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The Utilization of Maternal Health Care Services at Kilifi County Referral Hospital in Kenya
Vincent M. Iduri
,
C. Kibiti
,
Mary Kerich
2018
Corpus ID: 53475608
The main purpose of the study was to establish the level of utilization of the maternal health care services at Kilifi County…
Expand
Review
2018
Review
2018
AN APPROACH TO SLEEP AND INSOMNIA REVIEW
D’souza Vinitha
,
K. Smitha
,
A. Rai
,
Ravi Hegde
2018
Corpus ID: 212462700
Ayurveda is a science which gives importance to prevention and promotes healthy life style. In this regard urveda has quoted the…
Expand
2017
2017
Three-player conflicting interest games and nonlocality
K. Bolonek-Lason
Quantum Inf. Process.
2017
Corpus ID: 5148019
We outline the general construction of three-player games with incomplete information which fulfil the following conditions: (i…
Expand
2015
2015
Anorectal Malformations : Long-term outcome and aspects of secondary treatment
J. Danielson
2015
Corpus ID: 68538927
Faecal incontinence (FI) is defined as the inability to control bowel movements. The causes of FI are many and diverse. One of…
Expand
2014
2014
Topographic Transmissions and How To Talk About Them: The Case of the Southern Spa in Nineteenth-Century Russian Fiction
B. Morgan
2014
Corpus ID: 14612326
The Caucasian spa resort is a significant setting in Russian literature of the nineteenth century. This paper will trace the…
Expand
2013
2013
Factors Related With the Time to Surgery in Waiting-list Patients for Knee Prostheses
M. R. Jurado
,
A. Fidalgo
,
V. Villar
,
J. M. Medina
,
B. López
2013
Corpus ID: 32818433
2011
2011
Modern techniques in facial rejuvenation using NASHA gel
Colette C. Camenisch
,
Riikka Veltheim
2011
Corpus ID: 51345703
Colette Carmen CamenisCh is Specialist in Surgery and Attendant for Plastic, Reconstructive and Aesthetic Surgery, Department of…
Expand
2011
2011
Russian Empire - Tatar theater: The politics of culture in late Imperial Kazan.
Madina V. Goldberg
2011
Corpus ID: 151126291
2010
2010
Collision attack on NaSHA-384/512
Zhimin Li
,
Licheng Wang
,
Daofeng Li
,
Yixian Yang
International Conference on Networking and…
2010
Corpus ID: 62998
NaSHA is a family of hash functions submitted by Markovski and Mileva, it is accepted as one of the first SHA-3 round candidates…
Expand
2008
2008
Collision attack on NaSHA-512
Ji Li
,
Liangyu Xu
,
Xu Guan
IACR Cryptol. ePrint Arch.
2008
Corpus ID: 42522063
The hash function NaSHA [1] is a new algorithm proposed for SHA-3. The compression function adopts quasigroup transformations…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE