Keccak

Results: 146



#Item
111NIST hash function competition / Integrated circuits / Electronic design automation / Cryptographic hash functions / Electronic design / Application-specific integrated circuit / Keccak / Field-programmable gate array / Standard cell / Electronic engineering / Electronics / Cryptography

SHA-3 Conference, March 2012, Lessons Learned from Designing a 65 nm ASIC for Evaluating Third Round SHA-3 Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:01:30
112

PDF Document

Add to Reading List

Source URL: keccak.noekeon.org

- Date: 2013-02-27 15:26:40
    113Keccak / RadioGatún / Joan Daemen / Block cipher / Hash function / Cryptography / Cryptographic hash functions / NIST hash function competition

    Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-05-28 00:25:06
    114

    PDF Document

    Add to Reading List

    Source URL: keccak.noekeon.org

    - Date: 2013-02-27 15:26:40
      115

      PDF Document

      Add to Reading List

      Source URL: keccak.noekeon.org

      - Date: 2013-02-27 15:26:40
        116APL programming language family / J / Software engineering / Computer programming / Computing

        On alignment in K Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2 STMicroelectronics

        Add to Reading List

        Source URL: keccak.noekeon.org

        Language: English - Date: 2013-02-27 15:26:41
        117NIST hash function competition / Permutation / Function / Random permutation statistics / Permutation polynomial / Mathematics / Combinatorics / Keccak

        The K reference Guido B Joan D

        Add to Reading List

        Source URL: keccak.noekeon.org

        Language: English - Date: 2013-02-27 15:26:40
        118Binary arithmetic / Boolean algebra / Side channel attack / Power analysis / Advanced Encryption Standard / Mask / Timing attack / Algorithm / Blinding / Cryptography / Mathematics / Espionage

        Note on side-channel attacks and their countermeasures In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerab

        Add to Reading List

        Source URL: keccak.noekeon.org

        Language: English - Date: 2013-02-27 15:26:42
        119Power analysis / Keccak / NIST hash function competition / Side channel attack

        SHA-3 Conference, August 2010, Building Power Analysis Resistant Implementations of Keccak

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2012-05-30 13:08:32
        120

        PDF Document

        Add to Reading List

        Source URL: keccak.noekeon.org

        - Date: 2013-02-27 15:26:40
          UPDATE