نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

2010
Kris Gaj Jens-Peter Kaps Venkata Amirineni Marcin Rogawski Ekawat Homsirikamol

In this talk, we will introduce an open-source en­ vironment, called ATHENa for fair, comprehensive, automated, and collaborative hardware benchmarking of cryptographic al­ gorithms. We believe that this environment is very suitable for use in evaluation of hardware performance of SHA-3 candidates from the point of view of speed, resource utilization, cost, power consumption, etc. At this point...

Journal: :TIIS 2012
Kashif Latif Arshad Aziz Athar Mahboob

Cryptographic hash functions are widely used in many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In response to recent advances in cryptanalysis of commonly used hash algorithms, National Institute of Standards and Technology (NIST) announced a publicly open competition for selection of new standard Secure Ha...

2010
Christina Boura Anne Canteaut

The zero-sum distinguishers introduced by Aumasson and Meier are investigated. First, the minimal size of a zero-sum is established. Then, we analyze the impacts of the linear and the nonlinear layers in an iterated permutation on the construction of zero-sum partitions. Finally, these techniques are applied to the Keccak-f permutation and to Hamsi-256. We exhibit several zero-sum partitions fo...

Journal: :IACR Cryptology ePrint Archive 2008
Shuang Wu Dengguo Feng Wenling Wu

LUX is a new hash function submitted to NIST’s SHA-3 competition. In this paper, we found some non-random properties of LUX due to the weakness of origin shift vector. We also give reduced blank round collision attack, free-start collision attack and free-start preimage attack on LUX-256. The two collision attacks are trivial. The freestart preimage attack has complexity of about 2 and requires...

Journal: :J. Inf. Sci. Eng. 2014
Jian Zou Wenling Wu Shuang Wu Le Dong

The Grøstl hash function is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this paper, we propose some improved (pseudo) preimage attacks on the Grøstl hash function by using some techniques, such as subspace preimage attack and the guess-and-determine technique. We present the improved pseudo preimage attacks on 5-round Grøstl-256 hash function and 8-round...

2012
Rama Krishna Prasad

Secure Hash Algorithms are one of the forms of cryptographic algorithms. SHA hash functions are widely used security constructs. However, they are software implementations of SHA. This paper proposes techniques for hardware implementation of SHA. In order to provide security and improve performance, these methods are used in hardware reutilization and operation rescheduling. The purpose of impl...

Journal: :Journal on Advances in Theoretical and Applied Informatics 2016

Journal: :IACR Cryptology ePrint Archive 2010
Elena Andreeva Bart Mennink Bart Preneel

In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. At present, 14 candidates are left in the second round. An important criterion in the selecti...

Journal: :Journal of clinical microbiology 2010
Daniel H Fine Kenneth Markowitz David Furgang Kabilan Velliyagounder

This study examined in vivo and in vitro colonization by Aggregatibacter actinomycetemcomitans, an organism highly associated with aggressive periodontitis. Thirteen volunteers (5 were A. actinomycetemcomitans positive for buccal epithelial cells [BECs] and teeth, 5 were A. actinomycetemcomitans positive for teeth only, and 3 were A. actinomycetemcomitans-negative controls) had two mandibular s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید