TurboSHAKE

G Bertoni, J Daemen, S Hoffert, M Peeters… - Cryptology ePrint …, 2023 - eprint.iacr.org
In a recent presentation, we promoted the use of 12-round instances of Keccak, collectively
called “TurboSHAKE”, in post-quantum cryptographic schemes, but without defining them …

A versatile chaotic cryptosystem with a novel substitution-permutation scheme for internet-of-drones photography

HE Mohamadi, L Lahlou, N Kara, A Leivadeas - Nonlinear Dynamics, 2024 - Springer
Despite getting slighter in weights and smaller in sizes, camera-bearing UAVs are
extensively used in countless applications. This has posed significant safety and security …

Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- Permutation

J Jean, I Nikolić - International Workshop on Fast Software Encryption, 2015 - Springer
We introduce internal differential boomerang distinguisher as a combination of internal
differentials and classical boomerang distinguishers. The new boomerangs can be …

Symsum: Symmetric-sum distinguishers against round reduced SHA3

D Saha, S Kuila, DR Chowdhury - IACR Transactions on Symmetric …, 2017 - tosc.iacr.org
In this work we show the existence of special sets of inputs for which the sum of the images
under SHA3 exhibits a symmetric property. We develop an analytical framework which …

New Results on the SymSum Distinguisher on Round-Reduced SHA3

S Suryawanshi, D Saha, S Sachan - International Conference on …, 2020 - Springer
Abstract In ToSC 2017 Saha et al. demonstrated an interesting property of SHA3 based on
higher-order vectorial derivatives which led to self-symmetry based distinguishers referred to …

CASH: cellular automata based parameterized hash

S Kuila, D Saha, M Pal, DR Chowdhury - … 2014, Pune, India, October 18-22 …, 2014 - Springer
In this paper, we propose a new Cellular Automata (CA) based scalable parameterized hash
function family named CASH. The construction of CASH is inspired by sponge function and …

TIDAL: Practical Collisions on State-Reduced Keccak Variants

S Suryawanshi, D Saha, S Jaiswal - International Conference on Applied …, 2023 - Springer
An important tool that has contributed to collision search on Keccak/SHA3 is the Target
Difference Algorithm (TDA) and its internal differential counterpart Target Internal Difference …

[PDF][PDF] On the SHA-3 hash algorithms

S Kuila, D Chawdhury, M Pal - J. Math. Inform, 2015 - researchmathsci.org
In order to complement the previous hash standards SHA-1, SHA-2, NIST organizes an
open competition in search for new hash algorithm to be named SHA-3. After thorough …

[PDF][PDF] Security Evaluation of SHA-3

I Dinur - 2015 - cryptrec.go.jp
Abstract Draft FIPS PUB 202 [32] specifies the Secure Hash Algorithm-3 (SHA-3) family of
functions. The SHA-3 functions are based on instances of the Keccak algorithm that NIST …

[PDF][PDF] 轻量级 Hash 函数研究

龚征 - 密码学报, 2016 - jcr.cacrnet.org.cn
随着物联网技术及其相关应用的快速发展, 其信息安全性和隐私性也得到了业界的高度重视.
由于制造成本和便携性的限制, 物联网硬件的计算能力, 存储能力和能量仍然受到非常大的限制 …