Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,966,514 papers from all fields of science
Search
Sign In
Create Free Account
SHA-3
Known as:
Keccak
, Keccak-384
, SHA3
Expand
SHA-3 (Secure Hash Algorithm 3), a subset of the cryptographic primitive family Keccak (/ˈkɛtʃæk/, or /kɛtʃɑːk/), is a cryptographic hash function…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
Application-specific integrated circuit
Authenticated encryption
Avalanche effect
BLAKE (hash function)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
16.2 A Keccak-based wireless authentication tag with per-query key update and power-glitch attack countermeasures
C. Juvekar
,
Hyung-Min Lee
,
Joyce Kwong
,
A. Chandrakasan
IEEE International Solid-State Circuits…
2016
Corpus ID: 12869945
Counterfeiting is a major problem plaguing global supply chains. While small low-cost tagging solutions for supply-chain…
Expand
Review
2014
Review
2014
Data security frameworks in cloud
T. Devi
,
R. G. San
International Conference on Science Engineering…
2014
Corpus ID: 42267683
Cloud computing provides a wide range of services to consumers with lesser investment which are delivered over Internet. Security…
Expand
2014
2014
Integral distinguishers for reduced-round Stribog
Riham Altawy
,
A. Youssef
Information Processing Letters
2014
Corpus ID: 6280178
2012
2012
The new SHA-3 software shootout
D. Bernstein
,
T. Lange
IACR Cryptology ePrint Archive
2012
Corpus ID: 16538561
This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new…
Expand
2012
2012
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
Y. Jararweh
,
L. Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Mohammad
J. Information Security
2012
Corpus ID: 8263871
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National…
Expand
2011
2011
Boomerang Attacks on BLAKE-32
A. Biryukov
,
I. Nikolic
,
Arnab Roy
Fast Software Encryption Workshop
2011
Corpus ID: 15429055
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang…
Expand
2010
2010
Implementation of the compression function for selected SHA-3 candidates on FPGA
A. H. Namin
,
M. A. Hasan
IEEE International Symposium on Parallel…
2010
Corpus ID: 13994433
Implementation of the main building block (compression function) for five different SHA-3 candidates on reconfigurable hardware…
Expand
2010
2010
Evaluation of Randomness Test Results for Short Sequences
Fatih Sulak
,
A. Doganaksoy
,
Baris Ege
,
Onur Koçak
Sequences and Their Applications
2010
Corpus ID: 12485397
Randomness testing of cryptographic algorithms are of crucial importance to both designer and the attacker. When block ciphers…
Expand
2010
2010
A Hardware Wrapper for the SHA-3 Hash Algorithms
Brian Baldwin
,
A. Byrne
,
+4 authors
W. Marnane
IACR Cryptology ePrint Archive
2010
Corpus ID: 15273392
The second round of the NIST public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash…
Expand
2009
2009
Hardware Implementation of the SHA-3 Candidate Skein
S. Tillich
IACR Cryptology ePrint Archive
2009
Corpus ID: 14123635
Skein is a submission to the NIST SHA-3 hash function competition which has been optimized towards implementation in modern 64…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE