Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,328,744 papers from all fields of science
Search
Sign In
Create Free Account
SHA-3
Known as:
Keccak
, Keccak-384
, SHA3
Expand
SHA-3 (Secure Hash Algorithm 3), a subset of the cryptographic primitive family Keccak (/ˈkɛtʃæk/, or /kɛtʃɑːk/), is a cryptographic hash function…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
Application-specific integrated circuit
Authenticated encryption
Avalanche effect
BLAKE (hash function)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution)
A. Aly
,
T. Ashur
,
Eli Ben-Sasson
,
Siemen Dhooghe
,
Alan Szepieniec
IACR Cryptology ePrint Archive
2019
Corpus ID: 149450953
While common symmetric primitives like the AES and SHA3 are optimized for efficient hardware and software implementations, a…
Expand
2019
2019
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm
F. Liu
IACR Cryptology ePrint Archive
2019
Corpus ID: 52160782
In this paper, we introduce an alternative method to find ordinary cube variables for Keccak-MAC by making full use of the key…
Expand
2019
2019
Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
Felix Wegener
,
Christian Baiker
,
Amir Moradi
IACR Cryptology ePrint Archive
2019
Corpus ID: 53691636
Threshold Implementations are well known as a provably first-order secure Boolean masking scheme even in the presence of glitches…
Expand
2012
2012
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
Y. Jararweh
,
L. Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Mohammad
J. Information Security
2012
Corpus ID: 8263871
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National…
Expand
2012
2012
The new SHA-3 software shootout
D. Bernstein
,
T. Lange
IACR Cryptology ePrint Archive
2012
Corpus ID: 16538561
This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new…
Expand
2011
2011
A Pseudorandom Number Generator with KECCAK Hash Function
A. Gholipour
,
S. Mirzakuchaki
2011
Corpus ID: 53667467
2010
2010
Uniform Evaluation of Hardware Implementations of the Round-Two SHA-3 Candidates
S. Tillich
,
Martin Feldhofer
,
Mario Kirschbaum
,
Thomas Plos
,
Jörn-Marc Schmidt
,
Alexander Szekely
2010
Corpus ID: 10653970
We describe our high-speed hardware modules for the 14 candidates of the second evaluation round of the SHA-3 hash function…
Expand
2010
2010
Narrow-pipe SHA-3 candidates differ significantly from ideal random functions defined over big domains
D. Gligoroski
2010
Corpus ID: 7567556
In the SHA-3 competition 4 candidates in the second round are narrow-pipe designs. Those are: BLAKE, Hamsi, SHAvite-3 and Skein…
Expand
2008
2008
Cryptanalysis of EnRUPT
D. Khovratovich
,
I. Nikolic
IACR Cryptology ePrint Archive
2008
Corpus ID: 2445219
In this paper we present a preimage attack on EnRUPT- 512. We exploit the fact that the internal state is only a little bit…
Expand
2004
2004
Depositional Patterns and Oil/Gas Accumulation Features of Sha-3 Member Turbidites in Dongying Depression, Bohai Bay Basin
BaiGuoping
,
ZhangShanwen
2004
Corpus ID: 128052902
Recent exploration results indicate that a significant exploration potential remains in the Dongying Depression of the Bohai Bay…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required