Keccak

Results: 146



#Item
71Merkle–Damgård construction / Padding / Hash function / SHA-1 / MD4 / MD5 / SHA-2 / Preimage attack / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak Computer Science & Engineering Department, Haldia Institute of Technology, Haldia, India – 721657, E-mail – [removed] Abstract:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-06 05:29:27
72VEST / Keccak / Radio-frequency identification / Power analysis / ICE / Cryptography / Stream ciphers / Advanced Encryption Standard

Suit up! Made-to-Measure Hardware Implementations of A SCON Hannes Groß, Erich Wenger, Christoph Dobraunig, and Christoph Ehrenh¨ofer Graz University of Technology, Institute for Applied Information Processing and Comm

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 03:13:44
73VEST / Keccak / Differential cryptanalysis / Q / Advanced Encryption Standard / Cryptography / Stream ciphers / Linear cryptanalysis

Cryptanalysis of Ascon Christoph Dobraunig1 , Maria Eichlseder1 , Florian Mendel1 , and Martin Schl¨affer2 1 IAIK, Graz University of Technology, Austria

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-13 17:37:58
74System Architecture Evolution / Computing / GSM / Keccak / 3GPP / 3GP and 3G2 / European Telecommunications Standards Institute

TS[removed]V12[removed]Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2,

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-10-22 07:44:23
753GP and 3G2 / European Telecommunications Standards Institute / ICE / Keccak / VEST / System Architecture Evolution / GSM / Cryptography / 3GPP / Computing

TS[removed]V12[removed]Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2,

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-10-22 07:44:41
76Linear algebra / Keccak / NIST hash function competition / Matrices / Linear map / Exponential function / Transformation matrix / Weight / Kernel / Mathematics / Algebra / Transformation

Characterization of Column Parity Kernel and Differential Cryptanalysis of Keccak Yin Tan, Kalikinkar Mandal and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {y24tan,kmanda

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-01-19 20:48:05
77Hashing / Search algorithms / Keccak / SHA-2 / Hash function / SHA-1 / Password / Salt / NIST hash function competition / Cryptography / Cryptographic hash functions / Error detection and correction

Pleco and Plectron – Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {bo.zhu,x5fan,ggong}@uwaterloo.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-12 12:07:46
78NIST hash function competition / Authenticated encryption / Symmetric-key algorithm / Crypt / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Keccak

Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-07-02 15:54:48
79Keccak / Hashing / Block ciphers / Joan Daemen / Threefish / Skein / Fugue / Bart Preneel / Crypt / Cryptography / NIST hash function competition / Cryptographic hash functions

The Second SHA-3 Candidate Conference Accepted Papers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:50:30
80Cryptographic hash functions / Block ciphers / Advanced Encryption Standard / Keccak / Threefish / Skein / Joan Daemen / Grøstl / Crypt / Cryptography / NIST hash function competition / Error detection and correction

The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion] Zip files of the presentations and papers are now available. First Day

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 14:27:39
UPDATE