Skip to search formSkip to main contentSkip to account menu

SHA-3

Known as: Keccak, Keccak-384, SHA3 
SHA-3 (Secure Hash Algorithm 3), a subset of the cryptographic primitive family Keccak (/ˈkɛtʃæk/, or /kɛtʃɑːk/), is a cryptographic hash function… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
While common symmetric primitives like the AES and SHA3 are optimized for efficient hardware and software implementations, a… 
2019
2019
In this paper, we introduce an alternative method to find ordinary cube variables for Keccak-MAC by making full use of the key… 
2019
2019
Threshold Implementations are well known as a provably first-order secure Boolean masking scheme even in the presence of glitches… 
2012
2012
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National… 
2012
2012
This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new… 
2010
2010
We describe our high-speed hardware modules for the 14 candidates of the second evaluation round of the SHA-3 hash function… 
2010
2010
In the SHA-3 competition 4 candidates in the second round are narrow-pipe designs. Those are: BLAKE, Hamsi, SHAvite-3 and Skein… 
2008
2008
In this paper we present a preimage attack on EnRUPT- 512. We exploit the fact that the internal state is only a little bit… 
2004
2004
Recent exploration results indicate that a significant exploration potential remains in the Dongying Depression of the Bohai Bay…