TurboSHAKE
In a recent presentation, we promoted the use of 12-round instances of Keccak, collectively
called “TurboSHAKE”, in post-quantum cryptographic schemes, but without defining them …
called “TurboSHAKE”, in post-quantum cryptographic schemes, but without defining them …
A versatile chaotic cryptosystem with a novel substitution-permutation scheme for internet-of-drones photography
Despite getting slighter in weights and smaller in sizes, camera-bearing UAVs are
extensively used in countless applications. This has posed significant safety and security …
extensively used in countless applications. This has posed significant safety and security …
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- Permutation
We introduce internal differential boomerang distinguisher as a combination of internal
differentials and classical boomerang distinguishers. The new boomerangs can be …
differentials and classical boomerang distinguishers. The new boomerangs can be …
Symsum: Symmetric-sum distinguishers against round reduced SHA3
D Saha, S Kuila, DR Chowdhury - IACR Transactions on Symmetric …, 2017 - tosc.iacr.org
In this work we show the existence of special sets of inputs for which the sum of the images
under SHA3 exhibits a symmetric property. We develop an analytical framework which …
under SHA3 exhibits a symmetric property. We develop an analytical framework which …
New Results on the SymSum Distinguisher on Round-Reduced SHA3
Abstract In ToSC 2017 Saha et al. demonstrated an interesting property of SHA3 based on
higher-order vectorial derivatives which led to self-symmetry based distinguishers referred to …
higher-order vectorial derivatives which led to self-symmetry based distinguishers referred to …
CASH: cellular automata based parameterized hash
In this paper, we propose a new Cellular Automata (CA) based scalable parameterized hash
function family named CASH. The construction of CASH is inspired by sponge function and …
function family named CASH. The construction of CASH is inspired by sponge function and …
TIDAL: Practical Collisions on State-Reduced Keccak Variants
An important tool that has contributed to collision search on Keccak/SHA3 is the Target
Difference Algorithm (TDA) and its internal differential counterpart Target Internal Difference …
Difference Algorithm (TDA) and its internal differential counterpart Target Internal Difference …
[PDF][PDF] On the SHA-3 hash algorithms
S Kuila, D Chawdhury, M Pal - J. Math. Inform, 2015 - researchmathsci.org
In order to complement the previous hash standards SHA-1, SHA-2, NIST organizes an
open competition in search for new hash algorithm to be named SHA-3. After thorough …
open competition in search for new hash algorithm to be named SHA-3. After thorough …
[PDF][PDF] Security Evaluation of SHA-3
I Dinur - 2015 - cryptrec.go.jp
Abstract Draft FIPS PUB 202 [32] specifies the Secure Hash Algorithm-3 (SHA-3) family of
functions. The SHA-3 functions are based on instances of the Keccak algorithm that NIST …
functions. The SHA-3 functions are based on instances of the Keccak algorithm that NIST …
[PDF][PDF] 轻量级 Hash 函数研究
龚征 - 密码学报, 2016 - jcr.cacrnet.org.cn
随着物联网技术及其相关应用的快速发展, 其信息安全性和隐私性也得到了业界的高度重视.
由于制造成本和便携性的限制, 物联网硬件的计算能力, 存储能力和能量仍然受到非常大的限制 …
由于制造成本和便携性的限制, 物联网硬件的计算能力, 存储能力和能量仍然受到非常大的限制 …