Keccak
From MaRDI portal
Software:21813
swMATH9834MaRDI QIDQ21813FDOQ21813
Author name not available (Why is that?)
Source code repository: https://github.com/XKCP/XKCP
Cited In (99)
- Threshold implementations of small S-boxes
- An STP-based model toward designing S-boxes with good cryptographic properties
- The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
- Signcryption schemes with insider security in an ideal permutation model
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Quark: a lightweight hash
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- On the resilience of Even-Mansour to invariant permutations
- Exploring semi-bent Boolean functions arising from cellular automata
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- Differential-linear cryptanalysis from an algebraic perspective
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- From 5-pass \(\mathcal {MQ}\)-based identification to \(\mathcal {MQ}\)-based signatures
- Cellular automata based S-boxes
- Exploring energy efficiency of lightweight block ciphers
- Conditional cube attack on round-reduced River Keyak
- Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
- Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
- LWDSA: light-weight digital signature algorithm for wireless sensor networks
- qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- Troika: a ternary cryptographic hash function
- Higher-order differential properties of Keccak and Luffa
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- On the indifferentiability of key-alternating ciphers
- \textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\)
- Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
- Improved practical attacks on round-reduced Keccak
- Rotational rebound attacks on reduced Skein
- Cryptanalysis of full \texttt{RIPEMD-128}
- A structure-based chaotic hashing scheme
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Nonlinear diffusion layers
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- Concurrent signature without random oracles
- Collision attack on \({\mathtt Grindahl}\)
- Introducing the counter mode of operation to compressed sensing based encryption
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter
- Automatic verification of differential characteristics: application to reduced Gimli
- Practical Analysis of Reduced-Round Keccak
- Revisiting Gilbert's known-key distinguisher
- Efficient cryptography on the RISC-V architecture
- Algebraic key-recovery attacks on reduced-round Xoofff
- Open problems in hash function security
- Constructing chaos-based hash function via parallel impulse perturbation
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- New collision attacks on round-reduced Keccak
- Practical forgeries for ORANGE
- Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- The Complexity of Public-Key Cryptography
- CArrency: an energy-efficient proof-of-work scheme for crypto-currencies
- De Bruijn sequences and complexity of symmetric functions
- BBB secure nonce based MAC using public permutations
- Perfect nonlinear functions and cryptography
- Provable Security of BLAKE with Non-ideal Compression Function
- CBEAM: efficient authenticated encryption from feebly one-way \(\varphi \) functions
- Multi-user BBB security of public permutations based MAC
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
- Cryptanalysis of Ascon
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- A note on rotation symmetric S-boxes
- New results on the \texttt{SymSum} distinguisher on round-reduced \texttt{SHA3}
- Parallel Hashing via List Recoverability
- The NIST SHA-3 Competition: A Perspective on the Final Year
- Steganographic file system based on JPEG files
- Post-quantum cryptography: state of the art
- Thinking outside the superbox
- Hyperspectral data: efficient and secure transmission
- Balloon hashing: a memory-hard function providing provable protection against sequential attacks
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates
- FASTA -- a stream cipher for fast FHE evaluation
- Really fast syndrome-based hashing
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- Lightweight implementations of SHA-3 candidates on FPGAs
- CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps
- Asymmetric PAKE with low computation \textit{and} communication
- Pen and Paper Arguments for SIMON and SIMON-like Designs
- Adaptively code-correlation robustness functions and its applications to private set intersection
- Cryptographic applications of the duplex construction
- Differential property of \textsc{Present}-like structure
- Practical collision attacks against round-reduced SHA-3
- Extracts from the SHA-3 competition
- A low-area yet performant FPGA implementation of Shabal
- On the multi-output filtering model and its applications
- Protecting triple-DES against DPA. A practical application of domain-oriented masking
- An observation on NORX, BLAKE2, and ChaCha
- Differential power analysis of MAC-Keccak at any key-length
This page was built for software: Keccak