Results 221 to 230 of about 3,739 (238)
Some of the next articles are maybe not open access.

New Collision Attacks on Round-Reduced Keccak

2017
In this paper, we focus on collision attacks against Keccak hash function family and some of its variants. Following the framework developed by Dinur et al. at FSE 2012 where 4-round collisions were found by combining 3-round differential trails and 1-round connectors, we extend the connectors one round further hence achieve collision attacks for up to
Kexin Qiao   +3 more
openaire   +1 more source

Efficient Hybrid Random Number Generator Based on Keccak

2018 International Conference on Artificial Intelligence and Data Processing (IDAP), 2018
Random numbers are used in many areas such as cryptographic applications, statistics and game theory. These numbers are the most important part of these applications. There is a need for secure random numbers to guarantee the safety of these systems. In this study, a hybrid random number generator was designed to produce real random numbers that are ...
Selman Yakut, Ahmet Bedri Ozer
openaire   +1 more source

Allocating rotational cryptanalysis-based preimage attack on 4-round Keccak-224 for quantum setting

Quantum Information Processing, 2023
Runsong Wang   +4 more
semanticscholar   +1 more source

TIDAL: Practical Collisions on State-Reduced Keccak Variants

IACR Cryptology ePrint Archive, 2023
Sahiba Suryawanshi   +2 more
semanticscholar   +1 more source

Hybrid scalar/vector implementations of Keccak and SPHINCS+ on AArch64

IACR Cryptology ePrint Archive, 2022
Hanno Becker, Matthias J. Kannwischer
semanticscholar   +1 more source

Анализ алгоритма хэширования Keccak

Безопасность является важнейшей характеристикой современных ИТ. Многие решения проблемы основаны на использовании хэш-преобразований. В докладе анализируется алгоритм Keccak, который генерирует хэши различных длин: 224, 256,384 и 512. Следует отметить, что Keccak является криптографически стойкой хэш-функцией, что означает, что для любой длины хэша ...
openaire   +1 more source

Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms

International journal of information technology, 2022
D. S. Sahana, S. H. Brahmananda
semanticscholar   +1 more source

Automatic Search of Linear Structure: Applications to Keccak and Ascon

Conference on Information Security and Cryptology, 2023
Huina Li   +4 more
semanticscholar   +1 more source

Internal differential structure: preimage attacks on up to 5-round Keccak

Designs, Codes and Cryptography
Xiaoen Lin   +5 more
semanticscholar   +1 more source

Reconfigurable and Hardware-Efficient KECCAK Architecture with SHAKE Integration and Dynamic Input Processing for Post Quantum Cryptography

International Symposium on VLSI Technology, Systems, and Applications
Sahil Chauhan, Rahul Shrestha
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy