Results 221 to 230 of about 3,739 (238)
Some of the next articles are maybe not open access.
New Collision Attacks on Round-Reduced Keccak
2017In this paper, we focus on collision attacks against Keccak hash function family and some of its variants. Following the framework developed by Dinur et al. at FSE 2012 where 4-round collisions were found by combining 3-round differential trails and 1-round connectors, we extend the connectors one round further hence achieve collision attacks for up to
Kexin Qiao +3 more
openaire +1 more source
Efficient Hybrid Random Number Generator Based on Keccak
2018 International Conference on Artificial Intelligence and Data Processing (IDAP), 2018Random numbers are used in many areas such as cryptographic applications, statistics and game theory. These numbers are the most important part of these applications. There is a need for secure random numbers to guarantee the safety of these systems. In this study, a hybrid random number generator was designed to produce real random numbers that are ...
Selman Yakut, Ahmet Bedri Ozer
openaire +1 more source
Allocating rotational cryptanalysis-based preimage attack on 4-round Keccak-224 for quantum setting
Quantum Information Processing, 2023Runsong Wang +4 more
semanticscholar +1 more source
TIDAL: Practical Collisions on State-Reduced Keccak Variants
IACR Cryptology ePrint Archive, 2023Sahiba Suryawanshi +2 more
semanticscholar +1 more source
Hybrid scalar/vector implementations of Keccak and SPHINCS+ on AArch64
IACR Cryptology ePrint Archive, 2022Hanno Becker, Matthias J. Kannwischer
semanticscholar +1 more source
Анализ алгоритма хэширования Keccak
Безопасность является важнейшей характеристикой современных ИТ. Многие решения проблемы основаны на использовании хэш-преобразований. В докладе анализируется алгоритм Keccak, который генерирует хэши различных длин: 224, 256,384 и 512. Следует отметить, что Keccak является криптографически стойкой хэш-функцией, что означает, что для любой длины хэша ...openaire +1 more source
Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms
International journal of information technology, 2022D. S. Sahana, S. H. Brahmananda
semanticscholar +1 more source
Automatic Search of Linear Structure: Applications to Keccak and Ascon
Conference on Information Security and Cryptology, 2023Huina Li +4 more
semanticscholar +1 more source
Internal differential structure: preimage attacks on up to 5-round Keccak
Designs, Codes and CryptographyXiaoen Lin +5 more
semanticscholar +1 more source
International Symposium on VLSI Technology, Systems, and Applications
Sahil Chauhan, Rahul Shrestha
semanticscholar +1 more source
Sahil Chauhan, Rahul Shrestha
semanticscholar +1 more source

