News
Hash functions are often used to protect the integrity of information. In general, the design of hash functions should satisfy three standards: pre-image resistance, second pre-image resistance and ...
The ECHO hash function was developed for the NIST cryptographic SHA-3 hash function competition. To evaluate ECHO's performance, high-speed and low-cost ASIC architectures have been designed. The ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results