Results 211 to 220 of about 3,739 (238)
Some of the next articles are maybe not open access.
Differential Cryptanalysis of Keccak Variants
2013In October 2012, NIST has announced Keccak as the winner of the SHA-3 cryptographic hash function competition. Recently, at CT-RSA 2013, NIST brought up the idea to standardize Keccak variants with different parameters than those submitted to the SHA-3 competition.
Stefan Kölbl +3 more
openaire +1 more source
An Enhanced AES256 Key Generation Process with Keccak-F Permutation Method
2024 5th International Conference on Information Technology and Education Technology (ITET)Amidst the escalating cybersecurity challenges of 2023, our study introduces an innovative method to strengthen AES256 encryption by integrating the Keccak-f permutation into the key generation process.
Ma. Esther B. Chio +2 more
semanticscholar +1 more source
Information and Communication Technology Convergence
This study introduces an innovative approach to enhancing AES-256 encryption by integrating the Keccak permutation into its key generation process, aiming to improve both security and performance while reducing the number of encryption rounds.
Ma. Esther B. Chio +2 more
semanticscholar +1 more source
This study introduces an innovative approach to enhancing AES-256 encryption by integrating the Keccak permutation into its key generation process, aiming to improve both security and performance while reducing the number of encryption rounds.
Ma. Esther B. Chio +2 more
semanticscholar +1 more source
FPGA implementation of new standard hash function Keccak
2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), 2014High-speed hardware for Keccak, which was selected as a new standard hash function named SHA-3, was developed and its performance was evaluated against SHA-1 and −2 circuits through the use of various FPGA platforms. The results showed that Keccak is suitable for high-speed hardware implementations, but it is getting harder to implement on new FPGA ...
Tatsuya Honda +2 more
openaire +1 more source
Securing MANETs Using SHA3 Keccak Algorithm
2019As the world is going wireless, security is the primary concern. MANETs due to their dynamic nature are prone to major security risks. In few scenarios the nodes in a MANET either intentionally or unintentionally behave as selfish or malicious nodes. So identification and isolation of such nodes is necessary.
P. Ramya, T. SairamVamsi
openaire +1 more source
Differential Biases in Reduced-Round Keccak
2014The Keccak hash function is the winner of the SHA-3 competition. In this paper, we examine differential propagation properties of Keccak constituent functions. We discover that low-weight differentials produce a number of biased and fixed difference bits in the state after two rounds and provide a theoretical explanation for the existence of such a ...
Sourav Das, Willi Meier
openaire +1 more source
MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes
Designs, Codes and Cryptography, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wenquan Bi +4 more
openaire +1 more source
A Lightweight Folded Keccak-Based SHA-3 for Resource-Constrained Embedded Security
International Symposium on Embedded Multicore/Many-core Systems-on-ChipSecure Hash Algorithm 3 (SHA-3) is a crucial component in modern cryptographic systems, particularly in applications demanding high security and efficiency.
Siqi Xiong +7 more
semanticscholar +1 more source
Cryptanalysis of 2 Round Keccak-384
2018In this paper, we present a cryptanalysis of round reduced Keccak-384 for 2 rounds. The best known preimage attack for this variant of Keccak has the time complexity \(2^{129}\). In our analysis, we find a preimage in the time complexity of \(2^{89}\) and almost same memory is required.
Rajendra Kumar +2 more
openaire +1 more source
FPGA-based Design Approaches of Keccak Hash Function
2012 15th Euromicro Conference on Digital System Design, 2012Keccak hash function has been submitted to SHA-3 competition and it belongs to the final five candidate functions. In this paper FPGA implementations of Keccak function are presented. The designs were coded using HDL language and for the hardware implementation, a XILINX Virtex-5 FPGA was used.
George Provelengios +3 more
openaire +1 more source

