swMATH9834MaRDI QIDQ21813FDOQ21813
Author name not available (Why is that?)
Official website: http://keccak.noekeon.org/
Source code repository: https://github.com/XKCP/XKCP
Cited In (only showing first 100 items - show all)
- Threshold implementations of small S-boxes
- The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Quark: a lightweight hash
- MARVELlous
- MiMC
- SM4
- On the resilience of Even-Mansour to invariant permutations
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- Differential-linear cryptanalysis from an algebraic perspective
- Chaskey
- XooTools
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- From 5-pass \(\mathcal {MQ}\)-based identification to \(\mathcal {MQ}\)-based signatures
- Cellular automata based S-boxes
- Exploring energy efficiency of lightweight block ciphers
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Troika: a ternary cryptographic hash function
- Higher-order differential properties of Keccak and Luffa
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- On the indifferentiability of key-alternating ciphers
- Improved practical attacks on round-reduced Keccak
- Rotational rebound attacks on reduced Skein
- Cryptanalysis of full \texttt{RIPEMD-128}
- A structure-based chaotic hashing scheme
- M4RI
- KEM-DEM
- Salsa20
- ChaCha
- CubeHash
- eBASH
- SPARKSkein
- CAR30
- PRESENT
- Quark
- spongent
- scyther
- CFS
- eBACS
- NOEKEON
- MicroEliece
- NaCl
- BLAKE
- PHOTON
- CryptLogVer
- ICEBERG
- NanGate
- Whirlpool
- CBEAM
- SHARK
- LED
- Grain
- Skein Hash
- Chipwhisperer
- PICARO
- Serpent
- NIST Statistical Test Suite
- Saber
- PHP
- ATHENa
- DLCT
- Elligator
- LowMC
- Picnic
- PQM4
- tiny_sha3
- Concurrent signature without random oracles
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter
- TEA
- StegFS
- Kyber
- XKCP
- HACL*
- Practical Analysis of Reduced-Round Keccak
- Revisiting Gilbert's known-key distinguisher
- Algebraic key-recovery attacks on reduced-round Xoofff
- Open problems in hash function security
- Constructing chaos-based hash function via parallel impulse perturbation
- New collision attacks on round-reduced Keccak
- Practical forgeries for ORANGE
- Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
- De Bruijn sequences and complexity of symmetric functions
- Perfect nonlinear functions and cryptography
- Provable Security of BLAKE with Non-ideal Compression Function
- CBEAM: efficient authenticated encryption from feebly one-way \(\varphi \) functions
- Gimli
- Cryptanalysis of Ascon
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- An STP-based model toward designing S-boxes with good cryptographic properties
- Signcryption schemes with insider security in an ideal permutation model
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- Exploring semi-bent Boolean functions arising from cellular automata
- FIMA
- ExpFault
- KeccakTools
This page was built for software: Keccak