نتایج جستجو برای: nist lightweight cryptography competition

تعداد نتایج: 149027  

Journal: :Journal of Cyber Security Technology 2017

Journal: :Data Science Journal 2007
Robert Clark

The controversial provisions in the European Union’s Database Directive have created considerable uncertainty for commercial producers of databases, while recent case law has emasculated much of the Directive. However, researchers and academics must still work in a restrictive copyright environment within Europe. This paper reviews the Directive in the light of two recent UK reports that sugges...

In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2021

We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of AES and (candidate to NIST Lightweight Cryptography competition) Clyde, in ARM Cortex-M0 M3 devices. Rather than looking for possibly reduced orders (as frequently considered literature), we directly target these assuming their maximum order aim at reducing noise level thank...

2011
Ryan Toukatly

A global competition is currently taking place to select a hash function which will become a new standard in the field of cryptography. The competition was announced in 2007 by the National Institute of Standards and Technology (NIST) to find a successor to its previous Secure Hash Algorithm (SHA) standards, SHA-1 and SHA-2. The submissions have been narrowed down to a set of five, judged by th...

Journal: :Iet Computers and Digital Techniques 2023

The protection of communications between Internet Things (IoT) devices is great concern because the information exchanged contains vital sensitive data. Malicious agents seek to exploit those data extract secret about owners or system. Power side channel attacks are on these their power consumption unintentionally leaks correlatable device's Several studies have demonstrated effectiveness authe...

Journal: :Annales UMCS, Informatica 2012
Mateusz Buczek

StreamHash 2 is a hash function proposed by Michał Trojnara at the Cryptography and Security Systems in 2011 Conference. This algorithm is a member of StreamHash family which was first introduced in 2008 during the SHA-3 Competition. In this paper we will show collision attacks on the internal state of the StreamHash 2 hash function with complexity about 2 for the 32n-bit version of the algorit...

Journal: :Annales UMCS, Informatica 2011
Michal Trojnara

This paper describes the evolution of StreamHash cryptographic hash function family proposed by the author. The first member of the StreamHash family was StreamHash (now called StreamHash1) function, accepted for the first round of SHA-3 competition organized by the US government standards agency NIST. The competition has been started in order to select a new SHA-3 standard as the successor of ...

2012
Mario Lamberger Florian Mendel Vincent Rijmen

Hamsi-256 is a cryptographic hash functions submitted by Küçük to the NIST SHA-3 competition in 2008. It was selected by NIST as one of the 14 round 2 candidates in 2009. Even though Hamsi-256 did not make it to the final round in 2010 it is still an interesting target for cryptanalysts. Since Hamsi-256 has been proposed, it received a great deal of cryptanalysis. Besides the second-preimage at...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید