نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

2011
Xu Guo Meeta Srivastav Patrick Schaumont

Hardware implementation quality is an important factor in selecting the NIST SHA-3 competition finalists. However, a comprehensive methodology to benchmark five final round SHA-3 candidates in ASIC is challenging. Many factors need to be considered, including application scenarios, target technologies and optimization goals. This work describes detailed steps in the silicon implementation of a ...

2011
Xu Guo Meeta Srivastav Sinan Huang Dinesh Ganta Michael B. Henry Leyla Nazhandali Patrick Schaumont

Hardware implementation quality is an important factor in selecting the NIST SHA-3 competition finalists. However, a comprehensive methodology to benchmark five final round SHA-3 candidates in ASIC is challenging. Many factors need to be considered, including application scenarios, target technologies and optimization goals. This work describes detailed steps in the silicon implementation of a ...

2015
Itai Dinur

Draft FIPS PUB 202 [32] speci es the Secure Hash Algorithm-3 (SHA-3) family of functions. The SHA-3 functions are based on instances of the Keccak algorithm that NIST selected as the winner of the SHA-3 cryptographic hash algorithm competition. The SHA-3 family consists of four cryptographic hash functions, SHA3-224, SHA3-256, SHA3-384, and SHA3-512, and two extendableoutput functions (XOFs), S...

Journal: :Malaysian Journal of Computer Science 2022

With the rapid advancement of technologies and proliferation intelligent devices, connecting to internet challenges have grown manifold, such as ensuring communication security keeping user credentials secret. Data integrity privacy become crucial concerns in any ecosystem advanced interconnected communications. Cryptographic hash functions been extensively employed ensure data insecure environ...

Journal: :IACR Cryptology ePrint Archive 2012
Ekawat Homsirikamol Pawel Morawiecki Marcin Rogawski Marian Srebrny

In 2007, the U.S. National Institute of Standards and Technology (NIST) announced a public contest aiming at the selection of a new standard for a cryptographic hash function. In this paper, the security margin of five SHA-3 finalists is evaluated with an assumption that attacks launched on finalists should be practically verified. A method of attacks is called logical cryptanalysis where the o...

2010
Xu Guo Sinan Huang Leyla Nazhandali Patrick Schaumont

Hardware implementation quality will be considered as an important factor for evaluating the NIST SHA-3 competition candidates in the second round. The most traditional and popular hardware im­ plementation method is designing ASICs with standard cells. However, to benchmark 14 second round SHA-3 ASIC designs based on a fair and comprehensive methodology can be very challenging because of the u...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده برق و کامپیوتر 1392

چکیده امروزه رمزنگاری یکی از ابزارهای مهم برای اطمینان از ارسال امن داده در پست الکترونیک، بانکداری الکترونیک و دیگر ارتباطات حساس دیجیتالی است. یکی از ابزارهای مفید و مهم در مسایل اعتباری و رمزنگاری، استفاده از توابع درهم ساز است. در راستای کاربرد وسیع توابع رمزنگاری، نیاز به پیاده سازی با حجم مصرفی کم برای این توابع افزایش پیداکرده است. با توجه به نقاط ضعفی که در توابع درهم ساز sha-1 و نگرا...

Journal: :Research Journal of Information Technology 2013

2011
B. Denton R. Adhami

This paper discusses modern hash function construction using the NIST SHA-3 competition as a survey of modern hash function construction properties. Three primary hash function designs are identified based on the designs of SHA-3 candidates submitted as part of the NIST SHA-3 competition. These designs are Widepipe, Sponge, and HAsh Iterated FrAmework (HAIFA). Keywordscryptography; hashing; has...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید