Cryptology ePrint Archive: Report 2014/170
Available versions in chronological order
20140304:073912 (posted 04-Mar-2014 07:39:12 UTC)
Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
Shay Gueron
[
Cryptology ePrint archive
]