Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Exploring formal methods for cryptographic hash function implementations

From MaRDI portal
Publication:6535484
Jump to:navigation, search

DOI10.1007/978-3-031-35486-1_9zbMATH Open1545.94075MaRDI QIDQ6535484FDOQ6535484


Authors: Nicky Mouha Edit this on Wikidata


Publication date: 11 January 2024





Recommendations

  • Cryptographic hash functions: theory and practice
  • Formal verification of side-channel countermeasures using self-composition
  • scientific article; zbMATH DE number 1941230
  • Practical Formal Methods for Real World Cryptography (Invited Talk)
  • Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs


zbMATH Keywords

hash functionSHA-3KeccakBLAKEGrøstlCoreCrypto


Mathematics Subject Classification ID

Data encryption (aspects in computer science) (68P25) Cryptography (94A60)


Cites Work

  • A Decision Procedure for Bit-Vectors and Arrays
  • Finding Collisions in the Full SHA-1
  • Tools and Algorithms for the Construction and Analysis of Systems
  • Unintended features of APIs: cryptanalysis of incremental HMAC
  • A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms






This page was built for publication: Exploring formal methods for cryptographic hash function implementations

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535484)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:6535484&oldid=40055812"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 13 February 2025, at 16:10. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki