Results 1 to 10 of about 3,720 (219)

High-Speed Hardware Architecture Based on Error Detection for KECCAK [PDF]

open access: goldMicromachines, 2023
The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data.
Hassen Mestiri, Imen Barraj
doaj   +5 more sources

Single-Trace Attacks on Keccak [PDF]

open access: greenTransactions on Cryptographic Hardware and Embedded Systems, 2020
Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has found a large number of applications. It is, for instance, a common building block in schemes submitted to NIST’s post-quantum cryptography project. In many of
Matthias J. Kannwischer   +2 more
doaj   +6 more sources

Comparative Study of Keccak SHA-3 Implementations [PDF]

open access: goldCryptography, 2023
This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies ...
Alessandra Dolmeta   +2 more
doaj   +4 more sources

Algebraic Collision Attacks on Keccak

open access: diamondIACR Transactions on Symmetric Cryptology, 2021
In this paper, we analyze the collision resistance of the two smallest versions of Keccak which have a width of 200 and 400 bits respectively. We show that algebraic and linearization techniques can serve collision cryptanalysis by using some interesting
Rachelle Heim Boissier   +2 more
doaj   +5 more sources

A High-Entropy True Random Number Generator with Keccak Conditioning for FPGA. [PDF]

open access: goldSensors (Basel)
Any cryptographic system strongly relies on randomness to ensure robust encryption and masking methods. True Random Number Generators play a fundamental role in this context. The National Institute of Standards and Technology (NIST) and the Bundesamt für
Piscopo V   +4 more
europepmc   +4 more sources

Impeccable Keccak

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The standardization of the hash-based digital signature scheme SPHINCS+ proceeds faster than initially expected. This development seems to be welcomed by practitioners who appreciate the high confidence in SPHINCS+’s security assumptions and its ...
Ivan Gavrilan   +4 more
doaj   +4 more sources

Low-Latency Keccak at any Arbitrary Order

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2021
Correct application of masking on hardware implementation of cryptographic primitives necessitates the instantiation of registers in order to achieve the non-completeness (commonly said to stop the propagation of glitches). This sometimes leads to a high
Sara Zarei   +4 more
doaj   +4 more sources

Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]

open access: yesIACR Transactions on Symmetric Cryptology
Recently, linear structures and algebraic attacks have been widely used in preimage attacks on round-reduced Keccak. Inherited by pioneers’ work, we make some improvements for 3-round Keccak-256 and 4-round Keccak[r=640, c=160].
Xiaoen Lin, Le He, Hongbo Yu
doaj   +3 more sources

Revisiting Keccak and Dilithium Implementations on ARMv7-M

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Keccak is widely used in lattice-based cryptography (LBC) and its impact to the overall running time in LBC scheme can be predominant on platforms lacking dedicated SHA-3 instructions. This holds true on embedded devices for Kyber and Dilithium, two LBC
Junhao Huang   +7 more
doaj   +3 more sources

Improved Preimage Attacks on 3-Round Keccak-224/256

open access: diamondIACR Transactions on Symmetric Cryptology, 2021
In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second
Xiaoen Lin, Le He, Hongbo Yu
doaj   +7 more sources

Home - About - Disclaimer - Privacy