Keccak

From MaRDI portal
Software:21813



swMATH9834MaRDI QIDQ21813


No author found.

Source code repository: https://github.com/XKCP/XKCP




Related Items (99)

Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystemsDuplexing the Sponge: Single-Pass Authenticated Encryption and Other ApplicationsDifferential-linear cryptanalysis from an algebraic perspectiveThinking outside the superboxOn the resilience of Even-Mansour to invariant permutationsExploring semi-bent Boolean functions arising from cellular automataAlgebraic key-recovery attacks on reduced-round XoofffKey-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public PermutationsAn STP-based model toward designing S-boxes with good cryptographic propertiesNew Results on the SymSum Distinguisher on Round-Reduced SHA3BBB Secure Nonce Based MAC Using Public PermutationsEfficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava CodesKHAPE: Asymmetric PAKE from key-hiding key exchangeQuark: a lightweight hashHyperspectral data: efficient and secure transmissionLWDSA: light-weight digital signature algorithm for wireless sensor networksExtracts from the SHA-3 CompetitionProvable Security of BLAKE with Non-ideal Compression FunctionParallel Hashing via List RecoverabilitySecurity analysis of deterministic re-keying with masking and shuffling: application to ISAPThe Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBCA monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidatesCryptanalysis of full \texttt{RIPEMD-128}A structure-based chaotic hashing schemeFASTA -- a stream cipher for fast FHE evaluationDifferential Power Analysis of MAC-Keccak at Any Key-Length\textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\)Asymmetric PAKE with low computation \textit{and} communicationDifferential property of \textsc{Present}-like structureHigh-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega MicrocontrollersOpen problems in hash function securityCube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge FunctionA SAT-based preimage analysis of reduced \textsc{Keccak} hash functionsThreshold implementations of small S-boxesFrom 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based SignaturesAdaptively code-correlation robustness functions and its applications to private set intersectionConstructing keyed hash algorithm using enhanced chaotic map with varying parameterBalloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential AttacksLinear Structures: Applications to Cryptanalysis of Round-Reduced KeccakQuantum attacks against BBB secure PRFs or MACs built from public random permutationsCryptographic Applications of the Duplex ConstructionCollision attack on \({\mathtt Grindahl}\)Introducing the counter mode of operation to compressed sensing based encryptionAn algebraic attack on ciphers with low-degree round functions: application to full MiMCqDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairsFault attacks on nonce-based authenticated encryption: application to Keyak and KetjeConcurrent signature without random oraclesDe Bruijn sequences and complexity of symmetric functionsProtecting Triple-DES Against DPAStriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012STEGANOGRAPHIC FILE SYSTEM BASED ON JPEG FILESCBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ FunctionsReally Fast Syndrome-Based HashingThe NIST SHA-3 Competition: A Perspective on the Final YearHigher-Order Differential Properties of Keccak and LuffaConditional cube attack on round-reduced River KeyakCellular automata based S-boxesSigncryption schemes with insider security in an ideal permutation modelOn the Multi-output Filtering Model and Its ApplicationsAn observation on NORX, BLAKE2, and ChaChaCryptanalysis of AsconImproved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MACEfficient cryptography on the RISC-V architectureNonlinear diffusion layersTroika: a ternary cryptographic hash functionBreaking LWC candidates: sESTATE and Elephant in quantum settingPerfect nonlinear functions and cryptographyPost-Quantum Cryptography: State of the ArtExploring Energy Efficiency of Lightweight Block CiphersConstruction of Lightweight S-Boxes Using Feistel and MISTY Structures\textsc{Ascon} v1.2: lightweight authenticated encryption and hashingRotational rebound attacks on reduced SkeinImproved practical attacks on round-reduced KeccakZero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256A Low-Area Yet Performant FPGA Implementation of ShabalPractical collision attacks against round-reduced SHA-3CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent MapsEfficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal StretchPen and Paper Arguments for SIMON and SIMON-like DesignsSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsPractical Analysis of Reduced-Round KeccakLightweight Implementations of SHA-3 Candidates on FPGAsLightweight Multiplication in $$GF(2^n)$$ with Applications to MDS MatricesCArrency: an energy-efficient proof-of-work scheme for crypto-currenciesRevisiting Gilbert's known-key distinguisherOn the Indifferentiability of Key-Alternating CiphersPractical forgeries for ORANGEA note on rotation symmetric S-boxesMulti-user BBB security of public permutations based MACThe inverse of \(\chi\) and its applications to Rasta-like ciphersConstructing chaos-based hash function via parallel impulse perturbationAutomatic verification of differential characteristics: application to reduced GimliThe MALICIOUS framework: embedding backdoors into tweakable block ciphersOut of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systemsPreimage attacks on 4-round Keccak by solving multivariate quadratic systemsA template attack to reconstruct the input of SHA-3 on an 8-bit deviceThe Complexity of Public-Key CryptographyA Search Strategy to Optimize the Affine Variant Properties of S-BoxesNew Collision Attacks on Round-Reduced Keccak


This page was built for software: Keccak