The following pages link to Keccak (Q4924418):
Displaying 50 items.
- Keccak (Q21813) (← links)
- Cryptanalysis of full \texttt{RIPEMD-128} (Q321321) (← links)
- Concurrent signature without random oracles (Q476860) (← links)
- De Bruijn sequences and complexity of symmetric functions (Q662186) (← links)
- Rotational rebound attacks on reduced Skein (Q744348) (← links)
- Improved practical attacks on round-reduced Keccak (Q744599) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Exploring semi-bent Boolean functions arising from cellular automata (Q831678) (← links)
- Algebraic key-recovery attacks on reduced-round Xoofff (Q832336) (← links)
- Threshold implementations of small S-boxes (Q892276) (← links)
- Collision attack on \({\mathtt Grindahl}\) (Q901374) (← links)
- Introducing the counter mode of operation to compressed sensing based encryption (Q903367) (← links)
- Correlation cube attacks: from weak-key distinguisher to key recovery (Q1648859) (← links)
- On the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxes (Q1698626) (← links)
- A robust and sponge-like PRNG with improved efficiency (Q1698655) (← links)
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje (Q1726679) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- Conditional cube attack on round-reduced River Keyak (Q1752548) (← links)
- Cellular automata based S-boxes (Q1755184) (← links)
- Nonlinear diffusion layers (Q1791664) (← links)
- Signcryption schemes with insider security in an ideal permutation model (Q2003346) (← links)
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing (Q2044758) (← links)
- \textsc{Friet}: an authenticated encryption scheme with built-in fault detection (Q2055626) (← links)
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) (Q2056692) (← links)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields (Q2056720) (← links)
- Compactness of hashing modes and efficiency beyond Merkle tree (Q2056724) (← links)
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations (Q2068387) (← links)
- Multi-user BBB security of public permutations based MAC (Q2088959) (← links)
- Automatic verification of differential characteristics: application to reduced Gimli (Q2102064) (← links)
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068) (← links)
- A template attack to reconstruct the input of SHA-3 on an 8-bit device (Q2106680) (← links)
- Differential-linear cryptanalysis from an algebraic perspective (Q2128998) (← links)
- Thinking outside the superbox (Q2129002) (← links)
- KHAPE: Asymmetric PAKE from key-hiding key exchange (Q2139655) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- FASTA -- a stream cipher for fast FHE evaluation (Q2152175) (← links)
- Computing the distribution of differentials over the non-linear mapping \(\chi \) (Q2154056) (← links)
- Asymmetric PAKE with low computation \textit{and} communication (Q2170042) (← links)
- Cryptanalysis of round-reduced KECCAK using non-linear structures (Q2179387) (← links)
- Troika: a ternary cryptographic hash function (Q2285779) (← links)
- Practical collision attacks against round-reduced SHA-3 (Q2303457) (← links)
- Differential property of \textsc{Present}-like structure (Q2413209) (← links)
- Hyperspectral data: efficient and secure transmission (Q2633218) (← links)
- Adaptively code-correlation robustness functions and its applications to private set intersection (Q2682918) (← links)
- Cryptanalysis of Ascon (Q2790053) (← links)
- Post-Quantum Cryptography: State of the Art (Q2803619) (← links)
- Exploring Energy Efficiency of Lightweight Block Ciphers (Q2807203) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps (Q2817473) (← links)
- Pen and Paper Arguments for SIMON and SIMON-like Designs (Q2827732) (← links)