Keccak
From MaRDI portal
Software:21813
No author found.
Source code repository: https://github.com/XKCP/XKCP
Related Items (99)
Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems ⋮ Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications ⋮ Differential-linear cryptanalysis from an algebraic perspective ⋮ Thinking outside the superbox ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ Exploring semi-bent Boolean functions arising from cellular automata ⋮ Algebraic key-recovery attacks on reduced-round Xoofff ⋮ Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations ⋮ An STP-based model toward designing S-boxes with good cryptographic properties ⋮ New Results on the SymSum Distinguisher on Round-Reduced SHA3 ⋮ BBB Secure Nonce Based MAC Using Public Permutations ⋮ Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes ⋮ KHAPE: Asymmetric PAKE from key-hiding key exchange ⋮ Quark: a lightweight hash ⋮ Hyperspectral data: efficient and secure transmission ⋮ LWDSA: light-weight digital signature algorithm for wireless sensor networks ⋮ Extracts from the SHA-3 Competition ⋮ Provable Security of BLAKE with Non-ideal Compression Function ⋮ Parallel Hashing via List Recoverability ⋮ Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC ⋮ A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates ⋮ Cryptanalysis of full \texttt{RIPEMD-128} ⋮ A structure-based chaotic hashing scheme ⋮ FASTA -- a stream cipher for fast FHE evaluation ⋮ Differential Power Analysis of MAC-Keccak at Any Key-Length ⋮ \textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\) ⋮ Asymmetric PAKE with low computation \textit{and} communication ⋮ Differential property of \textsc{Present}-like structure ⋮ High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers ⋮ Open problems in hash function security ⋮ Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function ⋮ A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions ⋮ Threshold implementations of small S-boxes ⋮ From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures ⋮ Adaptively code-correlation robustness functions and its applications to private set intersection ⋮ Constructing keyed hash algorithm using enhanced chaotic map with varying parameter ⋮ Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks ⋮ Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak ⋮ Quantum attacks against BBB secure PRFs or MACs built from public random permutations ⋮ Cryptographic Applications of the Duplex Construction ⋮ Collision attack on \({\mathtt Grindahl}\) ⋮ Introducing the counter mode of operation to compressed sensing based encryption ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs ⋮ Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje ⋮ Concurrent signature without random oracles ⋮ De Bruijn sequences and complexity of symmetric functions ⋮ Protecting Triple-DES Against DPA ⋮ StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 ⋮ STEGANOGRAPHIC FILE SYSTEM BASED ON JPEG FILES ⋮ CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions ⋮ Really Fast Syndrome-Based Hashing ⋮ The NIST SHA-3 Competition: A Perspective on the Final Year ⋮ Higher-Order Differential Properties of Keccak and Luffa ⋮ Conditional cube attack on round-reduced River Keyak ⋮ Cellular automata based S-boxes ⋮ Signcryption schemes with insider security in an ideal permutation model ⋮ On the Multi-output Filtering Model and Its Applications ⋮ An observation on NORX, BLAKE2, and ChaCha ⋮ Cryptanalysis of Ascon ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC ⋮ Efficient cryptography on the RISC-V architecture ⋮ Nonlinear diffusion layers ⋮ Troika: a ternary cryptographic hash function ⋮ Breaking LWC candidates: sESTATE and Elephant in quantum setting ⋮ Perfect nonlinear functions and cryptography ⋮ Post-Quantum Cryptography: State of the Art ⋮ Exploring Energy Efficiency of Lightweight Block Ciphers ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing ⋮ Rotational rebound attacks on reduced Skein ⋮ Improved practical attacks on round-reduced Keccak ⋮ Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 ⋮ A Low-Area Yet Performant FPGA Implementation of Shabal ⋮ Practical collision attacks against round-reduced SHA-3 ⋮ CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps ⋮ Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch ⋮ Pen and Paper Arguments for SIMON and SIMON-like Designs ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Practical Analysis of Reduced-Round Keccak ⋮ Lightweight Implementations of SHA-3 Candidates on FPGAs ⋮ Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices ⋮ CArrency: an energy-efficient proof-of-work scheme for crypto-currencies ⋮ Revisiting Gilbert's known-key distinguisher ⋮ On the Indifferentiability of Key-Alternating Ciphers ⋮ Practical forgeries for ORANGE ⋮ A note on rotation symmetric S-boxes ⋮ Multi-user BBB security of public permutations based MAC ⋮ The inverse of \(\chi\) and its applications to Rasta-like ciphers ⋮ Constructing chaos-based hash function via parallel impulse perturbation ⋮ Automatic verification of differential characteristics: application to reduced Gimli ⋮ The MALICIOUS framework: embedding backdoors into tweakable block ciphers ⋮ Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems ⋮ Preimage attacks on 4-round Keccak by solving multivariate quadratic systems ⋮ A template attack to reconstruct the input of SHA-3 on an 8-bit device ⋮ The Complexity of Public-Key Cryptography ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes ⋮ New Collision Attacks on Round-Reduced Keccak
This page was built for software: Keccak