نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

2008
Terry P. Orlando

In recent years there have been a series of serious and alarming cryptanalytic attacks on several commonly-used hash functions, such as MD4, MD5, SHA-0, and SHA1 [13, 38]. These culminated with the celebrated work of Wang, Yin, and Yu from 2005, which demonstrated relatively efficient methods for finding collisions in the SHA-1 hash function [37]. Although there are several cryptographic hash f...

2008
Tobias Wittwer Roland Klees Bernhard Heck

We present software for spherical harmonic analysis (SHA) and spherical harmonic synthesis (SHS), which can be used for essentially arbitrary degrees and all co-latitudes in the interval (0◦, 180◦). The routines use extended-range floating-point arithmetic, in particular for the computation of the associated Legendre functions. The price to be paid is an increased computation time; for degree 3...

2014
M.Jothi Kumar Jean-Philippe Aumasson Luca Henzen Willi Meier

This paper proposes the Pipelined SHA-3 BLAKE algorithm, running on an FPGA with the intention of developing the optimization in FPGA for BLAKE algorithm. Secured hash algorithm-3(SHA-3) BLAKE algorithm is a family of cryptographic hash function published by the National Institute of Standards and Technology (NIST). To implement BLAKE algorithm we have utilized VHDL, where we introduce the pipe...

2011
Shusheng Liu Libin Wang Zheng Gong

On Nov 2007, NIST announced the SHA-3 competition to select a new hash standard as a replacement of SHA-2. On Dec 2010, five submissions have been selected as the final round candidates, including Skein, which have components based on ARX. In this paper, a new related-key boomerang distinguishing attack is proposed on 31-round Threefish-256 with a time complexity of about 2234. Our improved att...

Journal: :IACR Cryptology ePrint Archive 2006
Donghoon Chang Mridul Nandi

Kim et al. [4] and Contini et al. [3] studied on the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Especially, they considered the distinguishing attacks. However, they did not describe generic distinguishing attacks on NMAC and HMAC. In this paper, we describe the generic distinguishers to distinguish NMAC and HMAC with the birthday attack complexity and we prove the sec...

2010
A. H. Namin

In this work, FPGA implementation of the compression function for four of the second round candidates of the SHA-3 competition are presented. All implementations were performed using the same technology and optimization techniques to present a fair comparison between the candidates. For our implementations we have used the Stratix III FPGA family from Altera. Achieved results are compared with ...

2009
Yan Wang Mohan Yang

SHA-3 Cryptographic Hash Algorithm Competition is a competition raised by NIST in response to recent advances of cryptanalysis, aiming at selecting new hash algorithm instead of SHA-2 like AES selection. The compression function of a hash function could be written in the form of multivariate boolean function. In this paper, we introduce our algorithms of evaluating boolean function and applied ...

2005
TS Cheng H Yao

Cheung Sha Wan Dermatology Clinic, 3/F West Kowloon Health Centre, 303 Cheung Sha Wan Road, Kowloon, Hong Kong An 84-year-old Chinese male patient presented with multifocal bluish red papules on the right foot. Skin biopsy showed a nodular vasoformative tumour composing of spindle cells with slit-like spaces. Human herpesvirus (HHV-8) immunostaining was positive. Based on the clinical features,...

Journal: :Lecture Notes in Computer Science 2023

The KECCAK hash function was selected by NIST as the winner of $$\texttt {SHA-3}$$ competition in 2012 and became standard 2015. On account ’s importance theory applications, analysis its security has attracted increasing attention. In family, {SHA3-512}$$ shows strongest resistance against collision attacks: theoretical attacks only extend to four rounds solving polynomial systems with 64 time...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2023

In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes use arithmetical addition. We apply to HMAC-SHA-2. provide full mathematical analysis of the method and show under certain assumptions with sufficient amount traces any key can be revealed. experimental part demonstrate successful application attack both in software ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید