Results 191 to 200 of about 3,739 (238)
Blockchain-Powered LSTM-Attention Hybrid Model for Device Situation Awareness and On-Chain Anomaly Detection. [PDF]
Zhang Q, Yue C, Dong X, Du G, Wang D.
europepmc +1 more source
A Zero-Sum property for the Keccak-f Permutation with 18 Rounds ∗
Christina Boura, Anne Canteaut
openalex +1 more source
Antiplasmodial potential of phytochemicals from Citrus aurantifolia peels: a comprehensive in vitro and in silico study. [PDF]
Elmaidomy AH +8 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
FPGA-based tunable Keccak core
2023 International Conference on Smart Applications, Communications and Networking (SmartNets), 2023Nowadays’ great emphasis on data security has led to a great need for hardware accelerated cryptograhic algorithms to cope with the high communication bandwidth demand.
A. Maache, Abdesattar Kalache
semanticscholar +2 more sources
Embedded Keccak implementation on FPGA
2022 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), 2022The use of Blockchain has evolved over the last decade. It has touched many fields such as health, industry 4.0, smart cities, agriculture, education etc. Being a guarantee of security, the Blockchain requires to be careful with the data used.
Jalel Ktari +4 more
semanticscholar +2 more sources
Datenschutz und Datensicherheit - DuD, 2013
Wie beim DES-Nachfolger AES schrieb das US-amerikanische NIST 2007 einen offentlichen Wettbewerb um die Nachfolge des Hashverfahrens SHA-2 aus. Im Oktober 2012 fiel die Wahl auf Keccak. Die Autoren stellen den Hashalgorithmus vor, beschreiben eine Smartcard-Implementierung und stellen das Verfahren dem „amtierenden“ SHA-2-Standard gegenuber.
Pawel Swierczynski +2 more
openaire +1 more source
Wie beim DES-Nachfolger AES schrieb das US-amerikanische NIST 2007 einen offentlichen Wettbewerb um die Nachfolge des Hashverfahrens SHA-2 aus. Im Oktober 2012 fiel die Wahl auf Keccak. Die Autoren stellen den Hashalgorithmus vor, beschreiben eine Smartcard-Implementierung und stellen das Verfahren dem „amtierenden“ SHA-2-Standard gegenuber.
Pawel Swierczynski +2 more
openaire +1 more source
Improved Practical Attacks on Round-Reduced Keccak
Journal of Cryptology, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dinur, Itai, Dunkelman, Orr, Shamir, Adi
openaire +2 more sources
Accelerate Processing of Image with the Keccak-512 Algorithm on Cryptoprocessor
SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference, 2023Image hashing is a crucial technique for content authentication and image retrieval in various applications, including multimedia databases and copyright protection.
Argyrios Sideris +4 more
semanticscholar +1 more source
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak
IACR Cryptology ePrint Archive, 2023The Exclusive-OR Sum-of-Product (ESOP) minimization problem has long been of interest to the research community because of its importance in classical logic design (including low-power design and design for test), reversible logic synthesis, and ...
Runsong Wang +4 more
semanticscholar +1 more source

