Keccak
From MaRDI portal
Cited in
(only showing first 100 items - show all)- Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Practical Analysis of Reduced-Round Keccak
- MiMC
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- Cellular automata based S-boxes
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- From 5-pass \(\mathcal {MQ}\)-based identification to \(\mathcal {MQ}\)-based signatures
- Higher-order differential properties of Keccak and Luffa
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Chaskey
- Constructing chaos-based hash function via parallel impulse perturbation
- XooTools
- CBEAM: efficient authenticated encryption from feebly one-way \(\varphi \) functions
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- Revisiting Gilbert's known-key distinguisher
- Threshold implementations of small S-boxes
- Practical forgeries for ORANGE
- On the indifferentiability of key-alternating ciphers
- The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
- Troika: a ternary cryptographic hash function
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter
- Perfect nonlinear functions and cryptography
- Improved practical attacks on round-reduced Keccak
- Rotational rebound attacks on reduced Skein
- M4RI
- HAVAL
- HMQV
- PARSHA
- KEM-DEM
- Salsa20
- ChaCha
- CubeHash
- eBASH
- SPARKSkein
- CAR30
- PRESENT
- Quark
- spongent
- scyther
- CFS
- eBACS
- NOEKEON
- MicroEliece
- NaCl
- BLAKE
- PHOTON
- CryptLogVer
- ICEBERG
- NanGate
- Whirlpool
- CBEAM
- Provable Security of BLAKE with Non-ideal Compression Function
- SHARK
- LED
- Grain
- Skein Hash
- Chipwhisperer
- PICARO
- Serpent
- NIST Statistical Test Suite
- Saber
- PHP
- ATHENa
- DLCT
- Elligator
- LowMC
- Picnic
- PQM4
- tiny_sha3
- Algebraic key-recovery attacks on reduced-round Xoofff
- TEA
- StegFS
- Kyber
- XKCP
- HACL*
- De Bruijn sequences and complexity of symmetric functions
- Cryptanalysis of full \texttt{RIPEMD-128}
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Quark: a lightweight hash
- Open problems in hash function security
- A structure-based chaotic hashing scheme
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Exploring energy efficiency of lightweight block ciphers
- Differential-linear cryptanalysis from an algebraic perspective
- New collision attacks on round-reduced Keccak
- Gimli
- Cryptanalysis of Ascon
- Concurrent signature without random oracles
- LWDSA: light-weight digital signature algorithm for wireless sensor networks
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- MARVELlous
- SM4
- Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- FIMA
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems
This page was built for software: Keccak