Results 1 to 10 of about 243 (132)

High-Speed Hardware Architecture Based on Error Detection for KECCAK [PDF]

open access: yesMicromachines, 2023
The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data.
Hassen Mestiri, Imen Barraj
doaj   +2 more sources

Algebraic Collision Attacks on Keccak

open access: yesIACR Transactions on Symmetric Cryptology, 2021
In this paper, we analyze the collision resistance of the two smallest versions of Keccak which have a width of 200 and 400 bits respectively. We show that algebraic and linearization techniques can serve collision cryptanalysis by using some interesting
Rachelle Heim Boissier   +2 more
doaj   +4 more sources

Single-Trace Attacks on Keccak [PDF]

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has found a large number of applications. It is, for instance, a common building block in schemes submitted to NIST’s post-quantum cryptography project. In many of
Matthias J. Kannwischer   +2 more
doaj   +4 more sources

Low-Latency Keccak at any Arbitrary Order

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Correct application of masking on hardware implementation of cryptographic primitives necessitates the instantiation of registers in order to achieve the non-completeness (commonly said to stop the propagation of glitches). This sometimes leads to a high
Sara Zarei   +4 more
doaj   +2 more sources

Impeccable Keccak

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The standardization of the hash-based digital signature scheme SPHINCS+ proceeds faster than initially expected. This development seems to be welcomed by practitioners who appreciate the high confidence in SPHINCS+’s security assumptions and its ...
Ivan Gavrilan   +4 more
doaj   +3 more sources

A RISC-V Processor with Area-Efficient Memristor-Based In-Memory Computing for Hash Algorithm in Blockchain Applications [PDF]

open access: yesMicromachines, 2019
Blockchain technology is increasingly being used in Internet of things (IoT) devices for information security and data integrity. However, it is challenging to implement complex hash algorithms with limited resources in IoT devices owing to large energy ...
Xiaoyong Xue   +5 more
doaj   +2 more sources

Improved Preimage Attacks on 3-Round Keccak-224/256

open access: yesIACR Transactions on Symmetric Cryptology, 2021
In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second
Xiaoen Lin, Le He, Hongbo Yu
doaj   +5 more sources

Comparative Study of Keccak SHA-3 Implementations

open access: yesCryptography, 2023
This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies ...
Alessandra Dolmeta   +2 more
doaj   +2 more sources

Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]

open access: yesIACR Transactions on Symmetric Cryptology
Recently, linear structures and algebraic attacks have been widely used in preimage attacks on round-reduced Keccak. Inherited by pioneers’ work, we make some improvements for 3-round Keccak-256 and 4-round Keccak[r=640, c=160].
Xiaoen Lin, Le He, Hongbo Yu
doaj   +2 more sources

New Techniques for Searching Differential Trails in Keccak

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Keccak-f is the permutation used in the NIST SHA-3 hash function standard. Inspired by the previous exhaustive differential trail search methods by Mella et al.
Guozhen Liu, Weidong Qiu, Yi Tu
doaj   +4 more sources

Home - About - Disclaimer - Privacy