RadioGatún

Known as: Radio Gatun, Radio Gatún, RadioGatun 
RadioGatún is a cryptographic hash primitive created by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. It was first publicly… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2006-2014
02420062014

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The sponge function KECCAK is the versatile successor of SHA-1 and the SHA-2 series of hash functions. Its structure and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
In this paper, we explain the design choices of Panama [8] and RadioGatún [1], which lead to Keccak [3]. After a brief recall of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
In the next years, new hash function candidates will replace the old MD5 and SHA-1 standards and the current SHA-2 family. The… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2009
2009
In the next years, new hash function candidates will replace the old MD5 and SHA-1 standards and the current SHA-2 family. The… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2008
2008
In this paper we study the security of the RadioGatún family of hash functions, and more precisely the collision resistance of… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2008
2008
We investigate the security of the hash function design called RadioGatún in a recently proposed framework of sponge functions… (More)
  • figure 1
  • figure 2
  • table 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
Several hash functions have been presented to replace previous standard hash families SHA-1 and SHA-2. Besides resistance to… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2008
2008
This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher… (More)
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
Recent VLSI hash function designs allow incorporating features such as more complex input expansion schedules, more rounds and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
We present an approach to design cryptographic hash functions that builds on and improves the one underlying the Panama hash… (More)
Is this relevant?