نتایج جستجو برای: sha 3

تعداد نتایج: 1812667  

Journal: :IACR Cryptology ePrint Archive 2015
Christoph Dobraunig Maria Eichlseder Florian Mendel

Differential and linear cryptanalysis are the general purpose tools to analyze various cryptographic primitives. Both techniques have in common that they rely on the existence of good differential or linear characteristics. The difficulty of finding such characteristics depends on the primitive. For instance, AES is designed to be resistant against differential and linear attacks and therefore,...

2015
Eiji Sasaki Eiichi Tsuda Yuji Yamamoto Shugo Maeda Ryo Inoue Daisuke Chiba Hiroshi Fujita Ippei Takahashi Takashi Umeda Shigeyuki Nakaji Yasuyuki Ishibashi

INTRODUCTION Serum hyaluronic acid (sHA) is a serum biomarker for knee osteoarthritis (OA). Although sHA concentration is elevated in patients with knee OA, the relationship between serum concentration and disease progression remains unclear. We examined the relationship between sHA concentration and radiographic progression of knee OA in a cohort of individuals followed for 5 years. METHODS ...

Journal: :IACR Cryptology ePrint Archive 2008
Somitra Kumar Sanadhya Palash Sarkar

Most of the attacks against (reduced) SHA-2 family in literature have used local collisions which are valid for linearized version of SHA-2 hash functions. Recently, at FSE ’08, an attack against reduced round SHA-256 was presented by Nikolić and Biryukov which used a local collision which is valid for the actual SHA-256 function. It is a 9-step local collision which starts by introducing a mod...

Journal: :IACR Cryptology ePrint Archive 2012
Dag Arne Osvik

We present new software speed records for several popular hash functions on low-end 8-bit AVR microcontrollers. Target algorithms include widely deployed hash functions like SHA-1 and SHA-256 as well as the SHA-3 (second round) candidates Blake-32 and Skein-256. A significant aspect of our implementations is that they reduce the overall resource requirements, improving not only execution time b...

2014
Sheetal Deshmukh Apeksha Sakhare

SHA-3 (Secure hash algorithm-3), originally known as Keccak is a cryptographic hash function selected as the winner of the NIST hash function competition. Hash functions have many applications in cryptography mainly in digital signatures and message authentication codes and in network security. Implementation of the main building block (compression function) for five different SHA-3 candidates ...

Journal: :IACR Cryptology ePrint Archive 2011
Itai Dinur Orr Dunkelman Adi Shamir

The Keccak hash function is one of the five finalists in NIST’s SHA-3 competition, and so far it showed remarkable resistance against practical collision finding attacks: After several years of cryptanalysis and a lot of effort, the largest number of Keccak rounds for which actual collisions were found was only 2. In this paper we develop improved collision finding techniques which enable us to...

Journal: :IACR Cryptology ePrint Archive 2011
Donghoon Chang Mridul Nandi Moti Yung

The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In this paper, we provide the indifferentiable security proof on BLAKE with the bound O( σ 2 2n−3 ), where σ is the total number of blocks of queries, and n is the hash output size.

Journal: :IACR Cryptology ePrint Archive 2010
Yun-qiang Li Ai-lan Wang

Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA3 and Hamsi-256 is one of four kinds of Hamsi. In this paper we present a genetic algorithm to search near collisions for the compress function of Hamsi-256 , give a near collision on (256 − 20) bits and a near collision on (256 − 21) bits with four differences in the chaining value, and obtain a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید