Cryptology ePrint Archive: Report 2014/170

Available versions in chronological order


Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
Shay Gueron


[ Cryptology ePrint archive ]