Results 121 to 130 of about 3,739 (238)
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy. [PDF]
Torres-Alvarado A +5 more
europepmc +1 more source
A Pseudorandom Number Generator with KECCAK Hash Function [PDF]
A. Gholipour, Sattar Mirzakuchaki
openalex +1 more source
A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications. [PDF]
Costa VLRD, López J, Ribeiro MV.
europepmc +1 more source
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry
Sukhendu Kuila +3 more
openalex +2 more sources
Efficient implementation of code-based identification/signatures schemes
International audienceIn this paper we present efficient implementations of several code-based identification schemes, namely the Stern scheme, the Véron scheme and the Cayrel-Véron-El Yousfi scheme.
Cayrel, Pierre-Louis +4 more
core +1 more source
SHA 3 and Keccak variants computation speeds on constrained devices
Thibaut Vandervelden +3 more
openalex +2 more sources
Performances of Cryptographic Accumulators
International audienceCryptographic accumulators are space/time efficient data structures used to verify if a value belongs to a set. They have found many applications in networking and distributed systems since their in- troduction by Benaloh and de ...
Kumar, Amrit +2 more
core

