Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,098,311 papers from all fields of science
Search
Sign In
Create Free Account
SHA-3
Known as:
Keccak
, Keccak-384
, SHA3
Expand
SHA-3 (Secure Hash Algorithm 3), a subset of the cryptographic primitive family Keccak (/ˈkɛtʃæk/, or /kɛtʃɑːk/), is a cryptographic hash function…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
Application-specific integrated circuit
Authenticated encryption
Avalanche effect
BLAKE (hash function)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Exploring the use of shift register lookup tables for Keccak implementations on Xilinx FPGAs
J. Winderickx
,
J. Daemen
,
N. Mentens
International Conference on Field-Programmable…
2016
Corpus ID: 3727636
We explore the possibility of using shift register lookup tables (SRLs) for the implementation of Keccak on Xilinx FPGAs. The…
Expand
2015
2015
A universal hardware API for authenticated ciphers
Ekawat Homsirikamol
,
William Diehl
,
Ahmed Ferozpuri
,
Farnoud Farahmand
,
Umar Sharif
,
K. Gaj
International Conference on Reconfigurable…
2015
Corpus ID: 14277810
In this paper, we propose a universal hardware Application Programming Interface (API) for authenticated ciphers. In particular…
Expand
2013
2013
Privacy-Preserving Wireless Medical Sensor Network
X. Yi
,
J. Willemson
,
Farid Naït-Abdesselam
12th IEEE International Conference on Trust…
2013
Corpus ID: 13276289
In a wireless medical sensor network, the sensitive patient data is transmitted through the open air. It is more vulnerable to…
Expand
2012
2012
Implementation of Keccak hash function in Tree hashing mode on Nvidia GPU
Guillaume Sevestre
2012
Corpus ID: 61884617
This paper presents a Graphics Processing Unit implementation of KECCAK cryptographic hash function, in a parallel tree hash mode…
Expand
2012
2012
Efficient Hardware Implementations and Hardware Performance Evaluation of SHA-3 Finalists
Kashif Latif
,
M. Rao
,
A. Aziz
,
A. Mahboob
2012
Corpus ID: 18500191
Cryptographic hash functions are at the heart of many information security applications like digital signatures, message…
Expand
2011
2011
Boomerang Attacks on BLAKE-32
A. Biryukov
,
I. Nikolic
,
Arnab Roy
Fast Software Encryption Workshop
2011
Corpus ID: 15429055
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang…
Expand
2010
2010
Evaluation of Randomness Test Results for Short Sequences
Fatih Sulak
,
A. Doganaksoy
,
Baris Ege
,
Onur Koçak
Sequences and Their Applications
2010
Corpus ID: 12485397
Randomness testing of cryptographic algorithms are of crucial importance to both designer and the attacker. When block ciphers…
Expand
2010
2010
Implementation of the compression function for selected SHA-3 candidates on FPGA
A. H. Namin
,
M. A. Hasan
IEEE International Symposium on Parallel…
2010
Corpus ID: 13994433
Implementation of the main building block (compression function) for five different SHA-3 candidates on reconfigurable hardware…
Expand
2009
2009
The Road from Panama to Keccak via RadioGatún
G. Bertoni
,
J. Daemen
,
Michaël Peeters
,
G. V. Assche
Symmetric Cryptography
2009
Corpus ID: 2222603
In this paper, we explain the design choices of Panama (8) and RadioGat un (1), which lead to Keccak (3). After a brief recall of…
Expand
2009
2009
Hardware Implementation of the SHA-3 Candidate Skein
S. Tillich
IACR Cryptology ePrint Archive
2009
Corpus ID: 14123635
Skein is a submission to the NIST SHA-3 hash function competition which has been optimized towards implementation in modern 64…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE