Results 161 to 170 of about 2,808 (186)

Dickson polynomial-based secure group authentication scheme for Internet of Things. [PDF]

open access: yesSci Rep
Syed SA   +6 more
europepmc   +1 more source

Keccak und der SHA-2

Datenschutz und Datensicherheit - DuD, 2013
Wie beim DES-Nachfolger AES schrieb das US-amerikanische NIST 2007 einen offentlichen Wettbewerb um die Nachfolge des Hashverfahrens SHA-2 aus. Im Oktober 2012 fiel die Wahl auf Keccak. Die Autoren stellen den Hashalgorithmus vor, beschreiben eine Smartcard-Implementierung und stellen das Verfahren dem „amtierenden“ SHA-2-Standard gegenuber.
Pawel Swierczynski   +2 more
openaire   +1 more source

Improved Practical Attacks on Round-Reduced Keccak

Journal of Cryptology, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dinur, Itai, Dunkelman, Orr, Shamir, Adi
openaire   +2 more sources

Algebraic Attacks on Round-Reduced Keccak

2021
Since Keccak was selected as the SHA-3 standard, both its hash mode and keyed mode have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in analyzing the collision resistance and preimage resistance of round-reduced Keccak.
Fukang Liu   +3 more
openaire   +1 more source

Practical Analysis of Reduced-Round Keccak

2011
Keccak is a finalist of the SHA-3 competition. In this paper we propose a practical distinguisher on 4 rounds of the hash function with the submission parameters. Recently, the designers of Keccak published several challenges on reduced versions of the hash function. With regard to this, we propose a preimage attack on 2 rounds, a collision attack on 2
Naya-Plasencia, María   +3 more
openaire   +4 more sources

Skup kriptografskih algoritama grupe Keccak [PDF]

open access: possible, 2021
U završnom radu su opisani algoritmi uključeni u slobodno dostupni programski paket EXtended Keccak Code Package (XKCP). Izrađena je i objašnjena programska implementacija za ispitivanje i prikaz rada algoritama za računanje sažetaka sadržanih u normama FIPS 202 i NIST SP 800-185 koje je ostvarila grupa Keccak.
openaire   +1 more source

Side-Channel Analysis of MAC-Keccak

2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013
NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for crypto-graphic hashing. In this paper, we present a comprehensive Side-Channel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm.
Mostafa Taha, Patrick Schaumont
openaire   +1 more source

Home - About - Disclaimer - Privacy