Implementación hardware del algoritmo Keccak para Hash-3 y comparación con Blake, Grøstl, JH y Skein
Las funciones criptográficas Hash convierten un mensaje de longitud variable en un “resumen del mensaje”, y son usadas para aplicaciones de firma digital, códigos de autenticación de mensajes y otras aplicaciones para seguridad informática.
Melissa Ramírez +3 more
doaj +3 more sources
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
With the standardization of NIST post-quantum cryptographic (PQC) schemes, optimizing these PQC schemes across various platforms presents significant research value. While most existing software implementation efforts have concentrated on ARM platforms,
Jipeng Zhang +3 more
doaj +2 more sources
Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes
: Keccak is a standard hashing algorithm that is used in cryptographic protocols as Pseudo Random Functions (PRF), as Pseudo Random Number Generator (PRNG), to check data integrity or to create a Hash-based Message Authentication Code (HMAC).
Julien Maillard +3 more
semanticscholar +2 more sources
Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak [PDF]
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient ...
An Braeken
doaj +2 more sources
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor [PDF]
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris +2 more
doaj +2 more sources
The Road from Panama to Keccak via RadioGatún
In this presentation, we explain the design choices of Panama [1] and RadioGatun [2], which lead to Keccak [3]. After a brief recall of Panama, RadioGatun and the trail backtracking cost, we focus on three important aspects. First, we explain the role of the belt in the light of differential trails. Second, we discuss the relative advantages of a block
Guido Bertoni +3 more
openalex +4 more sources
New Conditional Cube Attack on Keccak Keyed Modes
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EUROCRYPT 2017. In their attack, a conditional cube variable was introduced, whose diffusion was significantly reduced by certain key bit conditions.
Zheng Li +5 more
doaj +4 more sources
Beccak: Combination of Blockchain and Keccak Algorithm for Improved Digital Signature Performace
Ensuring data integrity and security is a pressing challenge in the digital era, with digital certificates playing a crucial role in addressing these concerns.
Firman Maulana +4 more
semanticscholar +3 more sources
New techniques for trail bounds and application to differential trails in Keccak
We present new techniques to efficiently scan the space of high-probability differential trails in bit-oriented ciphers. Differential trails consist in sequences of state patterns that we represent as ordered lists of basic components in order to arrange
Silvia Mella +2 more
doaj +3 more sources
Fault Attacks Resistant Architecture for KECCAK Hash Function [PDF]
Les algorithmes cryptographiques KECCAK largement utilisés dans les circuits intégrés pour assurer un niveau élevé de sécurité à tous les systèmes qui nécessitent un hachage comme la vérification de l'intégrité et la génération de nombres aléatoires.
Fatma Kahri +3 more
openalex +2 more sources

