Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,358,812 papers from all fields of science
Search
Sign In
Create Free Account
Skein (hash function)
Known as:
Skein
, Skein hash function
, Skein (hash)
Expand
Skein is a cryptographic hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
Avalanche effect
Biclique attack
Block cipher
Botan
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Double affine Hecke algebras and generalized Jones polynomials
Y. Berest
,
Peter Samuelson
Compositio Mathematica
2014
Corpus ID: 117807550
In this paper we propose and discuss implications of a general conjecture that there is a natural action of a rank 1 double…
Expand
2011
2011
Boomerang Attacks on BLAKE-32
A. Biryukov
,
I. Nikolic
,
Arnab Roy
Fast Software Encryption Workshop
2011
Corpus ID: 15429055
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang…
Expand
2010
2010
Exotic smooth R^4, noncommutative algebras and quantization
T. Asselmeyer-Maluga
,
J. Król
2010
Corpus ID: 115176900
The paper shows deep connections between exotic smoothings of small R^4, noncommutative algebras of foliations and quantization…
Expand
2010
2010
Implementation of the compression function for selected SHA-3 candidates on FPGA
A. H. Namin
,
M. A. Hasan
IEEE International Symposium on Parallel…
2010
Corpus ID: 13994433
Implementation of the main building block (compression function) for five different SHA-3 candidates on reconfigurable hardware…
Expand
2010
2010
Alexander-Conway invariants of tangles
M. Polyak
2010
Corpus ID: 117594141
We consider an algebra of (classical or virtual) tangles over an ordered circuit operad and introduce Conway-type invariants of…
Expand
2010
2010
Comprehensive Comparison of Hardware Performance of Fourteen Round 2 SHA-3 Candidates with 512-bit Outputs Using Field Programmable Gate Arrays
K. Gaj
,
Ekawat Homsirikamol
2010
Corpus ID: 15595525
In this paper, we extend our evaluation of the hardware performance of 14 Round 2 SHA-3 candidates, accepted for the presentation…
Expand
2009
2009
On Chebyshev polynomials and torus knots
A. Gavrilik
,
A. M. Pavlyuk
2009
Corpus ID: 115175441
In this work we demonstrate that the q-numbers and their two-parameter generalization, the q,p-numbers, can be used to obtain…
Expand
1996
1996
Sensor technology integration in an intelligent machine for herring roe grading
E. Croft
,
C. W. D. Silva
,
Setiawan Kurnianto
1996
Corpus ID: 62174521
The development and integration of sensor technology for herring roe grading is described. In this application, by and large…
Expand
1983
1983
Oregon Estuarine Invertebrates: An Illustrated Guide to the Common and Important Invertebrate Animals
P. Rudy
,
Lynn Hay Rudy
,
Jay F. Watson
1983
Corpus ID: 128941385
Life history descriptions, drawings and bibliographies relating to 110 different invertebrate species found in Oregon estuaries…
Expand
1956
1956
Pressure Receptors in the Fins of the Dogfish Scylliorhinus Canicula
O. Löwenstein
1956
Corpus ID: 22462156
1. The presence of so-called terminal corpuscles in the connective tissues of the fins of Scylliorhinuis canicula , first…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE