Keccak
From MaRDI portal
swMATH9834MaRDI QIDQ21813FDOQ21813
Author name not available (Why is that?)
Official website: http://keccak.noekeon.org/
Source code repository: https://github.com/XKCP/XKCP
Cited In (only showing first 100 items - show all)
- An STP-based model toward designing S-boxes with good cryptographic properties
- Signcryption schemes with insider security in an ideal permutation model
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- Exploring semi-bent Boolean functions arising from cellular automata
- FIMA
- ExpFault
- KeccakTools
- Saturnin
- Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems
- Thinking outside the superbox
- Conditional cube attack on round-reduced River Keyak
- Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
- Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
- LWDSA: light-weight digital signature algorithm for wireless sensor networks
- qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs
- Subterranean
- High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
- Balloon hashing: a memory-hard function providing provable protection against sequential attacks
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- CAPA
- \textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\)
- ForkAE
- Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
- FASTA -- a stream cipher for fast FHE evaluation
- ISAP
- Tornado
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Nonlinear diffusion layers
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- Asymmetric PAKE with low computation \textit{and} communication
- Collision attack on \({\mathtt Grindahl}\)
- Introducing the counter mode of operation to compressed sensing based encryption
- Ciminion
- Automatic verification of differential characteristics: application to reduced Gimli
- Efficient cryptography on the RISC-V architecture
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Cryptographic applications of the duplex construction
- Glasgow subgraph solver
- Bosphorus
- LIGHTER-R
- FACCT
- FreePDK45
- Rowhammer.js
- Halo2
- maskVerif
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- The Complexity of Public-Key Cryptography
- CArrency: an energy-efficient proof-of-work scheme for crypto-currencies
- Practical collision attacks against round-reduced SHA-3
- BBB secure nonce based MAC using public permutations
- Multi-user BBB security of public permutations based MAC
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
- An observation on NORX, BLAKE2, and ChaCha
- Differential power analysis of MAC-Keccak at any key-length
- Verilator
- A note on rotation symmetric S-boxes
- New results on the \texttt{SymSum} distinguisher on round-reduced \texttt{SHA3}
- Parallel Hashing via List Recoverability
- The NIST SHA-3 Competition: A Perspective on the Final Year
- Steganographic file system based on JPEG files
- Post-quantum cryptography: state of the art
- Hyperspectral data: efficient and secure transmission
- Really fast syndrome-based hashing
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- Lightweight implementations of SHA-3 candidates on FPGAs
- CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps
- Pen and Paper Arguments for SIMON and SIMON-like Designs
- Adaptively code-correlation robustness functions and its applications to private set intersection
- Differential property of \textsc{Present}-like structure
- Extracts from the SHA-3 competition
- A low-area yet performant FPGA implementation of Shabal
- On the multi-output filtering model and its applications
- Protecting triple-DES against DPA. A practical application of domain-oriented masking
- Threshold implementations of small S-boxes
- The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Quark: a lightweight hash
- MARVELlous
- MiMC
- SM4
- On the resilience of Even-Mansour to invariant permutations
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- Differential-linear cryptanalysis from an algebraic perspective
- Chaskey
- XooTools
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- From 5-pass \(\mathcal {MQ}\)-based identification to \(\mathcal {MQ}\)-based signatures
- Cellular automata based S-boxes
- Exploring energy efficiency of lightweight block ciphers
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Troika: a ternary cryptographic hash function
This page was built for software: Keccak