Results 21 to 30 of about 3,739 (238)

Implementación hardware del algoritmo Keccak para Hash-3 y comparación con Blake, Grøstl, JH y Skein

open access: diamondInformador Técnico, 2013
Las funciones criptográficas Hash convierten un mensaje de longitud variable en un “resumen del mensaje”, y son usadas para aplicaciones de firma digital, códigos de autenticación de mensajes y otras aplicaciones para seguridad informática.
Melissa Ramírez   +3 more
doaj   +3 more sources

Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
With the standardization of NIST post-quantum cryptographic (PQC) schemes, optimizing these PQC schemes across various platforms presents significant research value. While most existing software implementation efforts have concentrated on ARM platforms,
Jipeng Zhang   +3 more
doaj   +2 more sources

Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes

open access: goldInternational Conference on Security and Cryptography
: Keccak is a standard hashing algorithm that is used in cryptographic protocols as Pseudo Random Functions (PRF), as Pseudo Random Number Generator (PRNG), to check data integrity or to create a Hash-based Message Authentication Code (HMAC).
Julien Maillard   +3 more
semanticscholar   +2 more sources

Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak [PDF]

open access: yesSensors, 2020
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient ...
An Braeken
doaj   +2 more sources

High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor [PDF]

open access: goldTechnologies, 2020
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris   +2 more
doaj   +2 more sources

The Road from Panama to Keccak via RadioGatún

open access: green, 2009
In this presentation, we explain the design choices of Panama [1] and RadioGatun [2], which lead to Keccak [3]. After a brief recall of Panama, RadioGatun and the trail backtracking cost, we focus on three important aspects. First, we explain the role of the belt in the light of differential trails. Second, we discuss the relative advantages of a block
Guido Bertoni   +3 more
openalex   +4 more sources

New Conditional Cube Attack on Keccak Keyed Modes

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EUROCRYPT 2017. In their attack, a conditional cube variable was introduced, whose diffusion was significantly reduced by certain key bit conditions.
Zheng Li   +5 more
doaj   +4 more sources

Beccak: Combination of Blockchain and Keccak Algorithm for Improved Digital Signature Performace

open access: green2024 7th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)
Ensuring data integrity and security is a pressing challenge in the digital era, with digital certificates playing a crucial role in addressing these concerns.
Firman Maulana   +4 more
semanticscholar   +3 more sources

New techniques for trail bounds and application to differential trails in Keccak

open access: greenIACR Transactions on Symmetric Cryptology, 2017
We present new techniques to efficiently scan the space of high-probability differential trails in bit-oriented ciphers. Differential trails consist in sequences of state patterns that we represent as ordered lists of basic components in order to arrange
Silvia Mella   +2 more
doaj   +3 more sources

Fault Attacks Resistant Architecture for KECCAK Hash Function [PDF]

open access: hybridInternational Journal of Advanced Computer Science and Applications, 2017
Les algorithmes cryptographiques KECCAK largement utilisés dans les circuits intégrés pour assurer un niveau élevé de sécurité à tous les systèmes qui nécessitent un hachage comme la vérification de l'intégrité et la génération de nombres aléatoires.
Fatma Kahri   +3 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy