Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,403,869 papers from all fields of science
Search
Sign In
Create Free Account
RadioGatún
Known as:
Radio Gatun
, Radio Gatún
, RadioGatun
RadioGatún is a cryptographic hash primitive created by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. It was first publicly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Birthday attack
Collision attack
Comparison of cryptographic hash functions
Cryptographic hash function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Generating Internal Collisions in the Alternating-Input Structure
G. Bertoni
,
J. Daemen
,
G. V. Assche
2014
Corpus ID: 207859568
The sponge function KECCAK is the versatile successor of SHA-1 and the SHA-2 series of hash functions. Its structure and…
Expand
2011
2011
Conception, preuves et analyse de fonctions de hachage cryptographiques. (Design, security proofs and cryptanalysis of cryptographic hash functions)
T. Fuhr
2011
Corpus ID: 8736593
Dans ce memoire nous etudions le domaine des fonctions de hachage, qui sont utilisees par de nombreux mecanismes cryptographiques…
Expand
Review
2010
Review
2010
Cryptanalysis and design of symmetric primitives
M. Gorski
2010
Corpus ID: 35653002
This thesis focuses on the cryptanalysis and the design of block ciphers and hash functions. The thesis starts with an overview…
Expand
2009
2009
Hardware evaluation of the stream cipher-based hash functions RadioGatún and irRUPT
L. Henzen
,
F. Carbognani
,
N. Felber
,
W. Fichtner
Design, Automation & Test in Europe Conference…
2009
Corpus ID: 11202494
In the next years, new hash function candidates will replace the old MD5 and SHA-1 standards and the current SHA-2 family. The…
Expand
2008
2008
Hardware Comparison of the Hash Function Candidates RADIOGATÚN, MAME, and LAKE
L. Henzen
,
F. Carbognani
,
N. Felber
,
W. Fichtner
Nordic Microelectronics Event
2008
Corpus ID: 21929388
Several hash functions have been presented to replace previous standard hash families SHA-1 and SHA-2. Besides resistance to…
Expand
2008
2008
Cryptanalysis of EnRUPT
D. Khovratovich
,
I. Nikolic
IACR Cryptology ePrint Archive
2008
Corpus ID: 2445219
In this paper we present a preimage attack on EnRUPT- 512. We exploit the fact that the internal state is only a little bit…
Expand
2007
2007
A System-on-Chip Design of the RadioGatún Hash Function
P. Kitsos
,
B. Prasad
International Conference on High Performance…
2007
Corpus ID: 3103310
Recent VLSI hash function designs allow incorporating features such as more complex input expansion schedules, more rounds and…
Expand
2006
2006
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
D. Chang
IACR Cryptology ePrint Archive
2006
Corpus ID: 5252209
CellHash [3] and SubHash [4] were suggested by J. Daemen, R. Govaerts and J. Vandewalle in 1991 and 1992. SubHash is an improved…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE