Results 121 to 130 of about 3,739 (238)

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy. [PDF]

open access: yesSensors (Basel), 2022
Torres-Alvarado A   +5 more
europepmc   +1 more source

Keccak [PDF]

open access: yes, 2013
Guido Bertoni   +3 more
openaire   +1 more source

Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry

open access: green, 2014
Sukhendu Kuila   +3 more
openalex   +2 more sources

Efficient implementation of code-based identification/signatures schemes

open access: yes, 2011
International audienceIn this paper we present efficient implementations of several code-based identification schemes, namely the Stern scheme, the Véron scheme and the Cayrel-Véron-El Yousfi scheme.
Cayrel, Pierre-Louis   +4 more
core   +1 more source

SHA 3 and Keccak variants computation speeds on constrained devices

open access: bronze, 2021
Thibaut Vandervelden   +3 more
openalex   +2 more sources

Performances of Cryptographic Accumulators

open access: yes, 2014
International audienceCryptographic accumulators are space/time efficient data structures used to verify if a value belongs to a set. They have found many applications in networking and distributed systems since their in- troduction by Benaloh and de ...
Kumar, Amrit   +2 more
core  

Home - About - Disclaimer - Privacy