Results 11 to 20 of about 3,739 (238)

New Techniques for Searching Differential Trails in Keccak

open access: greenIACR Transactions on Symmetric Cryptology, 2020
Keccak-f is the permutation used in the NIST SHA-3 hash function standard. Inspired by the previous exhaustive differential trail search methods by Mella et al.
Guozhen Liu, Weidong Qiu, Yi Tu
doaj   +5 more sources

Tanda tangan Digital Menggunakan Algoritme Keccak dan RSA

open access: diamondJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2016
Just like conventional signatures, digital signatures can be used to prove the authenticity of a document in digital form. In addition, digital signatures can also be used to prove the validity of the author of the document, so that the author of the ...
Rezania Agramanisti Azdy
doaj   +4 more sources

Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems [PDF]

open access: goldIET Information Security, 2023
In this paper, improved preimage attacks are presented on 3‐round Keccak‐256 and Keccak‐512 and 4‐round Keccak‐256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing ...
Junling Pei, Lusheng Chen
doaj   +2 more sources

Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP

open access: diamondIACR Transactions on Symmetric Cryptology, 2018
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 2015. It recovers the key through two phases: the preprocessing phase for precomputing a look-up table and online phase for querying the output and getting ...
Ling Song, Jian Guo
doaj   +4 more sources

A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices

open access: yesInformation, 2023
Hash functions are an essential mechanism in today’s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including ...
Argyrios Sideris   +2 more
doaj   +2 more sources

Rotational cryptanalysis of round-reduced Keccak [PDF]

open access: green, 2012
In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST’s contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-\(f\)[1600 ...
Paweł Morawiecki   +2 more
openalex   +3 more sources

Design and implementation of an energy-efficient Keccak algorithm ASIC

open access: greenDianzi Jishu Yingyong, 2019
The complete hardware circuit of Keccak algorithm which can support the four modes of SHA3 is designed and implemented. Based on the detailed analysis of the sponge functions and Keccak algorithm, the modular idea is used to divide the circuit structure ...
Tuo Zhao, Chen Tao, Li Wei, Nan Longmei
doaj   +2 more sources

Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures

open access: diamondIACR Transactions on Symmetric Cryptology, 2017
In this paper, based on the work pioneered by Aumasson and Meier, Dinur et al., and Guo et al., we construct some new delicate structures from the roundreduced versions of Keccakhash function family. The new constructed structures are called cross-linear
Ting Li   +3 more
doaj   +3 more sources

Rhythmic Keccak: SCA Security and Low Latency in HW

open access: greenTransactions on Cryptographic Hardware and Embedded Systems, 2018
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches.
Victor Arribas   +4 more
doaj   +4 more sources

A RISC-V Processor with Area-Efficient Memristor-Based In-Memory Computing for Hash Algorithm in Blockchain Applications [PDF]

open access: yesMicromachines, 2019
Blockchain technology is increasingly being used in Internet of things (IoT) devices for information security and data integrity. However, it is challenging to implement complex hash algorithms with limited resources in IoT devices owing to large energy ...
Xiaoyong Xue   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy