Skip to search formSkip to main contentSkip to account menu

SHA-3

Known as: Keccak, Keccak-384, SHA3 
SHA-3 (Secure Hash Algorithm 3), a subset of the cryptographic primitive family Keccak (/ˈkɛtʃæk/, or /kɛtʃɑːk/), is a cryptographic hash function… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
We explore the possibility of using shift register lookup tables (SRLs) for the implementation of Keccak on Xilinx FPGAs. The… 
2015
2015
In this paper, we propose a universal hardware Application Programming Interface (API) for authenticated ciphers. In particular… 
2013
2013
In a wireless medical sensor network, the sensitive patient data is transmitted through the open air. It is more vulnerable to… 
2012
2012
This paper presents a Graphics Processing Unit implementation of KECCAK cryptographic hash function, in a parallel tree hash mode… 
2012
2012
Cryptographic hash functions are at the heart of many information security applications like digital signatures, message… 
2011
2011
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang… 
2010
2010
Randomness testing of cryptographic algorithms are of crucial importance to both designer and the attacker. When block ciphers… 
2010
2010
Implementation of the main building block (compression function) for five different SHA-3 candidates on reconfigurable hardware… 
2009
2009
In this paper, we explain the design choices of Panama (8) and RadioGat un (1), which lead to Keccak (3). After a brief recall of… 
2009
2009
Skein is a submission to the NIST SHA-3 hash function competition which has been optimized towards implementation in modern 64…