Results 281 to 290 of about 37,018 (310)

Algebraic fault analysis of SHA-3

Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, 2017
This paper presents an efficient algebraic fault analysis on all four modes of SHA-3 under relaxed fault models. This is the first work to apply algebraic techniques on fault analysis of SHA-3. Results show that algebraic fault analysis on SHA-3 is very efficient and effective due to the clear algebraic properties of Keccak operations.
Pei Luo   +3 more
openaire   +1 more source

Inside SHA-3

IEEE Potentials, 2013
The National Institute of Standards and Technology (NIST) has selected a new cryptographic hash algorithm through a public competition. The new hash algorithm is referred to as the Secure Hash Algorithm 3 (SHA-3) and is intended to complement the SHA-2 hash algorithms currently specified in Federal Information Processing Standard (FIPS) 180-3, Secure ...
openaire   +1 more source

Improving FPGA based SHA-3 structures

2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2017
This work is focused on FPGA based implementations of the SHA-3 hash functions. The existing literature classifies the existing implementations according to the adopted structural optimization techniques, namely: folding, pipelining and unrolling. Several structures have been proposed in the state-of-the-art, which vary mainly in the level of folding ...
Magnus Sundal, Ricardo Chaves
openaire   +1 more source

Serialized lightweight SHA-3 FPGA implementations

Microprocessors and Microsystems, 2019
Abstract In this article, we extend our study of lightweight FPGA implementations of SHA-3 published at ReConFig 2016. We use the shallow pipeline optimization technique for the slice-oriented SHA-3 architecture developed previously and examine additional aspects.
Bernhard Jungk, Marc Stöttinger
openaire   +1 more source

Home - About - Disclaimer - Privacy