Results 161 to 170 of about 2,808 (186)
Proactive detection of anomalous behavior in Ethereum accounts using XAI-enabled ensemble stacking with Bayesian optimization. [PDF]
Chithanuru V, Ramaiah M.
europepmc +1 more source
Dickson polynomial-based secure group authentication scheme for Internet of Things. [PDF]
Syed SA +6 more
europepmc +1 more source
Blockchain-Powered LSTM-Attention Hybrid Model for Device Situation Awareness and On-Chain Anomaly Detection. [PDF]
Zhang Q, Yue C, Dong X, Du G, Wang D.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Datenschutz und Datensicherheit - DuD, 2013
Wie beim DES-Nachfolger AES schrieb das US-amerikanische NIST 2007 einen offentlichen Wettbewerb um die Nachfolge des Hashverfahrens SHA-2 aus. Im Oktober 2012 fiel die Wahl auf Keccak. Die Autoren stellen den Hashalgorithmus vor, beschreiben eine Smartcard-Implementierung und stellen das Verfahren dem „amtierenden“ SHA-2-Standard gegenuber.
Pawel Swierczynski +2 more
openaire +1 more source
Wie beim DES-Nachfolger AES schrieb das US-amerikanische NIST 2007 einen offentlichen Wettbewerb um die Nachfolge des Hashverfahrens SHA-2 aus. Im Oktober 2012 fiel die Wahl auf Keccak. Die Autoren stellen den Hashalgorithmus vor, beschreiben eine Smartcard-Implementierung und stellen das Verfahren dem „amtierenden“ SHA-2-Standard gegenuber.
Pawel Swierczynski +2 more
openaire +1 more source
Improved Practical Attacks on Round-Reduced Keccak
Journal of Cryptology, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dinur, Itai, Dunkelman, Orr, Shamir, Adi
openaire +2 more sources
Algebraic Attacks on Round-Reduced Keccak
2021Since Keccak was selected as the SHA-3 standard, both its hash mode and keyed mode have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in analyzing the collision resistance and preimage resistance of round-reduced Keccak.
Fukang Liu +3 more
openaire +1 more source
Practical Analysis of Reduced-Round Keccak
2011Keccak is a finalist of the SHA-3 competition. In this paper we propose a practical distinguisher on 4 rounds of the hash function with the submission parameters. Recently, the designers of Keccak published several challenges on reduced versions of the hash function. With regard to this, we propose a preimage attack on 2 rounds, a collision attack on 2
Naya-Plasencia, María +3 more
openaire +4 more sources
Skup kriptografskih algoritama grupe Keccak [PDF]
U završnom radu su opisani algoritmi uključeni u slobodno dostupni programski paket EXtended Keccak Code Package (XKCP). Izrađena je i objašnjena programska implementacija za ispitivanje i prikaz rada algoritama za računanje sažetaka sadržanih u normama FIPS 202 i NIST SP 800-185 koje je ostvarila grupa Keccak.
openaire +1 more source
Side-Channel Analysis of MAC-Keccak
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for crypto-graphic hashing. In this paper, we present a comprehensive Side-Channel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm.
Mostafa Taha, Patrick Schaumont
openaire +1 more source

