SHA-3

Known as: Keccak, Keccak-384, SHA3 
SHA-3 (Secure Hash Algorithm 3), a subset of the cryptographic primitive family Keccak (/ˈkɛtʃæk/, or /kɛtʃɑːk/), is a cryptographic hash function… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
This Standard specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2012
2012
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We introduce a new concept in splice-and-cut attacks on hash functions, which bridges the gap between preimage attacks and a… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2011
2011
Allowing good performances on different platforms is an important criteria for the selection of the future sha-3 standard. In… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
(Abstract) Cryptographic hash functions are used extensively in information security, most notably in digital authentication and… (More)
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
  • figure 2.5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
BLAKE is our proposal for SHA-3. BLAKE entirely relies on previously analyzed components: it uses the HAIFA iteration mode and… (More)
  • table 1.1
  • figure 1.1
  • table 1.2
  • table 2.1
  • figure 2.1
Is this relevant?
2010
2010
In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
This report describes the SWIFFTX hash function. It is part of our submission package to the SHA-3 hash function competition. The… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
The ITC will preliminarily determine, within 25 days after the date on which it receives notice of the initiation, whether there… (More)
Is this relevant?