نتایج جستجو برای: sha 3
تعداد نتایج: 1812667 فیلتر نتایج به سال:
In recent years there have been a series of serious and alarming cryptanalytic attacks on several commonly-used hash functions, such as MD4, MD5, SHA-0, and SHA1 [13, 38]. These culminated with the celebrated work of Wang, Yin, and Yu from 2005, which demonstrated relatively efficient methods for finding collisions in the SHA-1 hash function [37]. Although there are several cryptographic hash f...
We present software for spherical harmonic analysis (SHA) and spherical harmonic synthesis (SHS), which can be used for essentially arbitrary degrees and all co-latitudes in the interval (0◦, 180◦). The routines use extended-range floating-point arithmetic, in particular for the computation of the associated Legendre functions. The price to be paid is an increased computation time; for degree 3...
This paper proposes the Pipelined SHA-3 BLAKE algorithm, running on an FPGA with the intention of developing the optimization in FPGA for BLAKE algorithm. Secured hash algorithm-3(SHA-3) BLAKE algorithm is a family of cryptographic hash function published by the National Institute of Standards and Technology (NIST). To implement BLAKE algorithm we have utilized VHDL, where we introduce the pipe...
On Nov 2007, NIST announced the SHA-3 competition to select a new hash standard as a replacement of SHA-2. On Dec 2010, five submissions have been selected as the final round candidates, including Skein, which have components based on ARX. In this paper, a new related-key boomerang distinguishing attack is proposed on 31-round Threefish-256 with a time complexity of about 2234. Our improved att...
Kim et al. [4] and Contini et al. [3] studied on the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Especially, they considered the distinguishing attacks. However, they did not describe generic distinguishing attacks on NMAC and HMAC. In this paper, we describe the generic distinguishers to distinguish NMAC and HMAC with the birthday attack complexity and we prove the sec...
In this work, FPGA implementation of the compression function for four of the second round candidates of the SHA-3 competition are presented. All implementations were performed using the same technology and optimization techniques to present a fair comparison between the candidates. For our implementations we have used the Stratix III FPGA family from Altera. Achieved results are compared with ...
SHA-3 Cryptographic Hash Algorithm Competition is a competition raised by NIST in response to recent advances of cryptanalysis, aiming at selecting new hash algorithm instead of SHA-2 like AES selection. The compression function of a hash function could be written in the form of multivariate boolean function. In this paper, we introduce our algorithms of evaluating boolean function and applied ...
Cheung Sha Wan Dermatology Clinic, 3/F West Kowloon Health Centre, 303 Cheung Sha Wan Road, Kowloon, Hong Kong An 84-year-old Chinese male patient presented with multifocal bluish red papules on the right foot. Skin biopsy showed a nodular vasoformative tumour composing of spindle cells with slit-like spaces. Human herpesvirus (HHV-8) immunostaining was positive. Based on the clinical features,...
The KECCAK hash function was selected by NIST as the winner of $$\texttt {SHA-3}$$ competition in 2012 and became standard 2015. On account ’s importance theory applications, analysis its security has attracted increasing attention. In family, {SHA3-512}$$ shows strongest resistance against collision attacks: theoretical attacks only extend to four rounds solving polynomial systems with 64 time...
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes use arithmetical addition. We apply to HMAC-SHA-2. provide full mathematical analysis of the method and show under certain assumptions with sufficient amount traces any key can be revealed. experimental part demonstrate successful application attack both in software ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید