Skip to search formSkip to main contentSkip to account menu

SHA-3

Known as: Keccak, Keccak-384, SHA3 
SHA-3 (Secure Hash Algorithm 3), a subset of the cryptographic primitive family Keccak (/ˈkɛtʃæk/, or /kɛtʃɑːk/), is a cryptographic hash function… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Counterfeiting is a major problem plaguing global supply chains. While small low-cost tagging solutions for supply-chain… 
Review
2014
Review
2014
Cloud computing provides a wide range of services to consumers with lesser investment which are delivered over Internet. Security… 
2012
2012
This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new… 
2012
2012
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National… 
2011
2011
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang… 
2010
2010
Implementation of the main building block (compression function) for five different SHA-3 candidates on reconfigurable hardware… 
2010
2010
Randomness testing of cryptographic algorithms are of crucial importance to both designer and the attacker. When block ciphers… 
2010
2010
The second round of the NIST public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash… 
2009
2009
Skein is a submission to the NIST SHA-3 hash function competition which has been optimized towards implementation in modern 64…