Cited in
(only showing first 100 items - show all)- Differential power analysis of MAC-Keccak at any key-length
- Threshold implementations of small S-boxes
- An STP-based model toward designing S-boxes with good cryptographic properties
- Signcryption schemes with insider security in an ideal permutation model
- The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- Quark: a lightweight hash
- On the resilience of Even-Mansour to invariant permutations
- Exploring semi-bent Boolean functions arising from cellular automata
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- A note on rotation symmetric S-boxes
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- New results on the \texttt{SymSum} distinguisher on round-reduced \texttt{SHA3}
- Parallel Hashing via List Recoverability
- Differential-linear cryptanalysis from an algebraic perspective
- The NIST SHA-3 Competition: A Perspective on the Final Year
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Steganographic file system based on JPEG files
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- From 5-pass \(\mathcal {MQ}\)-based identification to \(\mathcal {MQ}\)-based signatures
- Cellular automata based S-boxes
- Post-quantum cryptography: state of the art
- Thinking outside the superbox
- Conditional cube attack on round-reduced River Keyak
- Exploring energy efficiency of lightweight block ciphers
- Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
- LWDSA: light-weight digital signature algorithm for wireless sensor networks
- Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
- qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs
- Hyperspectral data: efficient and secure transmission
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
- Balloon hashing: a memory-hard function providing provable protection against sequential attacks
- Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
- Troika: a ternary cryptographic hash function
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- \textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\)
- Higher-order differential properties of Keccak and Luffa
- Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
- On the indifferentiability of key-alternating ciphers
- M4RI
- HAVAL
- HMQV
- PARSHA
- KEM-DEM
- Salsa20
- ChaCha
- CubeHash
- eBASH
- SPARKSkein
- CAR30
- PRESENT
- Quark
- spongent
- scyther
- CFS
- eBACS
- NOEKEON
- MicroEliece
- NaCl
- BLAKE
- PHOTON
- CryptLogVer
- ICEBERG
- NanGate
- Whirlpool
- CBEAM
- Improved practical attacks on round-reduced Keccak
- Rotational rebound attacks on reduced Skein
- SHARK
- LED
- Grain
- Skein Hash
- Chipwhisperer
- PICARO
- Serpent
- NIST Statistical Test Suite
- Saber
- PHP
- ATHENa
- DLCT
- Elligator
- LowMC
- Picnic
- PQM4
- tiny_sha3
- TEA
- StegFS
- Kyber
- XKCP
- HACL*
- Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
- Cryptanalysis of full \texttt{RIPEMD-128}
This page was built for software: Keccak