Results 31 to 40 of about 32,440 (142)

Hashing technique based on SHA-3 using chaotic maps1

open access: yesInformatika, 2020
New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security.
A. V. Sidorenko, M. S. Shishko
doaj   +1 more source

Breaking Ground: A New Area Record for Low-Latency First-Order Masked SHA-3

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
SHA-3, the latest hash standard from NIST, is utilized by numerous cryptographic algorithms to handle sensitive information. Consequently, SHA-3 has become a prime target for side-channel attacks, with numerous studies demonstrating successful breaches ...
Cankun Zhao   +8 more
doaj   +1 more source

Improved Preimage Attacks on 3-Round Keccak-224/256

open access: yesIACR Transactions on Symmetric Cryptology, 2021
In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second
Xiaoen Lin, Le He, Hongbo Yu
doaj   +1 more source

Quick Boot of Trusted Execution Environment With Hardware Accelerators

open access: yesIEEE Access, 2020
The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode.
Trong-Thuc Hoang   +6 more
doaj   +1 more source

Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices

open access: yesIoT
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments.
Iain Baird   +4 more
doaj   +1 more source

Digital Signature System Using SHA-3 and ECDSA

open access: yesUNISTEK, 2023
This research aims to implement an information security system for electronic documents using electronic signatures based on  ECDSA (Elliptic Curve Digital Signature Algorithm) and SHA-3 (Secure Hash Algorithm 3) algorithms. This research was conducted to answer questions about the security and integrity protection of digital documents in today's ...
Ade Ismail   +2 more
openaire   +1 more source

Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this paper, based on the work pioneered by Aumasson and Meier, Dinur et al., and Guo et al., we construct some new delicate structures from the roundreduced versions of Keccakhash function family. The new constructed structures are called cross-linear
Ting Li   +3 more
doaj   +1 more source

Classification of the SHA-3 Candidates

open access: yes, 2009
In this note we give an overview on the current state of the SHA-3 candidates. First, we classify all publicly known candidates and, second, we outline and summarize the performance data as given in the candidates documentation for $64$-bit and $32$-bit implementations. We define performance classes and classify the hash algorithms.
Fleischmann, Ewan   +2 more
openaire   +3 more sources

Optimization of preimage resistance on SHA-3 algorithm(SHA-3算法的抗原象攻击性能优化)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2016
通过对SHA-3算法置换函数Keccak-f的线性性质以及缩减轮数的Keccak杂凑函数原象攻击的研究,提出了 SHA-3算法的抗原象攻击性能优化设计方案.首先结合Keccak杂凑函数的差分特点和θ置换函数的奇偶性质,分析了基于CP-kernel的SHA-3算法原象攻击;然后针对目前实施原象攻击的方法,在θ置换函数运算后异或随机数以打乱其汉明重量,改变CP-kernel的校验性质,阻止攻击者利用中间相遇的方法寻找原象,提高了 SHA-3 算法的抗原象攻击能力;最后利用VHDL硬件语言实现抗原象攻击SHA-
LIJianrui(李建瑞)   +2 more
doaj   +1 more source

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy