Keccak
From MaRDI portal
Software:21813
swMATH9834MaRDI QIDQ21813FDOQ21813
Author name not available (Why is that?)
Source code repository: https://github.com/XKCP/XKCP
Cited In (99)
- Cryptographic Applications of the Duplex Construction
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- A note on rotation symmetric S-boxes
- Parallel Hashing via List Recoverability
- The NIST SHA-3 Competition: A Perspective on the Final Year
- A Low-Area Yet Performant FPGA Implementation of Shabal
- Extracts from the SHA-3 Competition
- Protecting Triple-DES Against DPA
- Thinking outside the superbox
- Differential Power Analysis of MAC-Keccak at Any Key-Length
- Hyperspectral data: efficient and secure transmission
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates
- FASTA -- a stream cipher for fast FHE evaluation
- Post-Quantum Cryptography: State of the Art
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps
- Asymmetric PAKE with low computation \textit{and} communication
- Pen and Paper Arguments for SIMON and SIMON-like Designs
- Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
- On the Multi-output Filtering Model and Its Applications
- New Results on the SymSum Distinguisher on Round-Reduced SHA3
- Adaptively code-correlation robustness functions and its applications to private set intersection
- Really Fast Syndrome-Based Hashing
- Lightweight Implementations of SHA-3 Candidates on FPGAs
- Differential property of \textsc{Present}-like structure
- Practical collision attacks against round-reduced SHA-3
- STEGANOGRAPHIC FILE SYSTEM BASED ON JPEG FILES
- An observation on NORX, BLAKE2, and ChaCha
- Threshold implementations of small S-boxes
- An STP-based model toward designing S-boxes with good cryptographic properties
- Signcryption schemes with insider security in an ideal permutation model
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Quark: a lightweight hash
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- On the resilience of Even-Mansour to invariant permutations
- Exploring semi-bent Boolean functions arising from cellular automata
- Differential-linear cryptanalysis from an algebraic perspective
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Cellular automata based S-boxes
- Conditional cube attack on round-reduced River Keyak
- LWDSA: light-weight digital signature algorithm for wireless sensor networks
- qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC
- Troika: a ternary cryptographic hash function
- New Collision Attacks on Round-Reduced Keccak
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- \textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\)
- Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices
- BBB Secure Nonce Based MAC Using Public Permutations
- From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures
- Improved practical attacks on round-reduced Keccak
- Rotational rebound attacks on reduced Skein
- Cryptanalysis of full \texttt{RIPEMD-128}
- A structure-based chaotic hashing scheme
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- Exploring Energy Efficiency of Lightweight Block Ciphers
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes
- Nonlinear diffusion layers
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions
- Concurrent signature without random oracles
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
- Collision attack on \({\mathtt Grindahl}\)
- Introducing the counter mode of operation to compressed sensing based encryption
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter
- Automatic verification of differential characteristics: application to reduced Gimli
- High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers
- Practical Analysis of Reduced-Round Keccak
- Revisiting Gilbert's known-key distinguisher
- Efficient cryptography on the RISC-V architecture
- Algebraic key-recovery attacks on reduced-round Xoofff
- Open problems in hash function security
- On the Indifferentiability of Key-Alternating Ciphers
- Constructing chaos-based hash function via parallel impulse perturbation
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Higher-Order Differential Properties of Keccak and Luffa
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Practical forgeries for ORANGE
- Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- The Complexity of Public-Key Cryptography
- CArrency: an energy-efficient proof-of-work scheme for crypto-currencies
- De Bruijn sequences and complexity of symmetric functions
- Perfect nonlinear functions and cryptography
- Provable Security of BLAKE with Non-ideal Compression Function
- Multi-user BBB security of public permutations based MAC
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
- Cryptanalysis of Ascon
This page was built for software: Keccak