Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,557 papers from all fields of science
Search
Sign In
Create Free Account
Skein (hash function)
Known as:
Skein
, Skein hash function
, Skein (hash)
Expand
Skein is a cryptographic hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
Avalanche effect
Biclique attack
Block cipher
Botan
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Double affine Hecke algebras and generalized Jones polynomials
Y. Berest
,
Peter Samuelson
Compositio Mathematica
2014
Corpus ID: 117807550
In this paper we propose and discuss implications of a general conjecture that there is a natural action of a rank 1 double…
Expand
2013
2013
On Kauffman bracket skein modules at roots of unity
Thang T. Q. Lê
2013
Corpus ID: 117347578
We reprove and expand results of Bonahon and Wong on central elements of the Kauffman bracket skein modules at root of 1 and on…
Expand
Highly Cited
2013
Highly Cited
2013
A comparative study on illumination preprocessing in face recognition
Hu Han
,
S. Shan
,
Xilin Chen
,
Wen Gao
Pattern Recognition
2013
Corpus ID: 16502545
Highly Cited
2012
Highly Cited
2012
Representations of the Kauffman bracket skein algebra I: invariants and miraculous cancellations
F. Bonahon
,
H. Wong
2012
Corpus ID: 119002882
We study finite-dimensional representations of the Kauffman bracket skein algebra of a surface S. In particular, we construct…
Expand
Highly Cited
2011
Highly Cited
2011
Compact FPGA Implementations of the Five SHA-3 Finalists
Stéphanie Kerckhof
,
François Durvaux
,
Nicolas Veyrat-Charvillon
,
F. Regazzoni
,
G. M. D. Dormale
,
François-Xavier Standaert
Smart Card Research and Advanced Application…
2011
Corpus ID: 15383033
Allowing good performances on different platforms is an important criteria for the selection of the future sha-3 standard. In…
Expand
Highly Cited
2010
Highly Cited
2010
Rotational Rebound Attacks on Reduced Skein
D. Khovratovich
,
I. Nikolic
,
Christian Rechberger
Journal of Cryptology
2010
Corpus ID: 6664503
In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack…
Expand
2010
2010
Exotic smooth R^4, noncommutative algebras and quantization
T. Asselmeyer-Maluga
,
J. Król
2010
Corpus ID: 115176900
The paper shows deep connections between exotic smoothings of small R^4, noncommutative algebras of foliations and quantization…
Expand
Highly Cited
2004
Highly Cited
2004
Multicriteria Financial Portfolio Risk Management for International Projects
S. Han
,
James Diekmann
,
Young Lee
,
Jong-ho Ock
2004
Corpus ID: 17849205
While opportunities for international construction firms have been growing with globalization, the risks involved with…
Expand
1994
1994
Topological methods to compute Chern-Simons invariants
D. Auckly
Mathematical Proceedings of the Cambridge…
1994
Corpus ID: 12749387
In this paper we develop a method which may be used to compute the Chern-Simons invariants of a large class of representations on…
Expand
1963
1963
The creative world of Mozart
P. Láng
1963
Corpus ID: 191351202
Every phase of his career and output, the workings of his mind, and his relations with other composers are being studied by…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE