Improving security of lightweith SHA-3 against preimage attacks (original) (raw)
International Journal of Electronics and Telecommunications
visibility
…
description
8 pages
link
1 file
Sign up for access to the world's latest research.
checkGet notified about relevant papers
checkSave papers to use in your research
checkJoin the discussion with peers
checkTrack your impact
Related papers
Use of embedded FPGA resources in implementations of 14 round 2 SHA-3 candidates
2011 International Conference on Field-Programmable Technology, 2011
Cryptographic Hash Functions and Attacks – A Detailed Study
International Journal of Advanced Research in Computer Science, 2020
Detail Power Analysis of the SHA-3 Hashing Algorithm Candidates on Xilinx Spartan-3E
International Journal of Computer and Electrical Engineering, 2013
HANDBOOK of APPLIED CRYPTOGRAPHY
A Robust Review of SHA: Featuring Coherent Characteristics
2020
An Overview of Image Security Techiques
International Journal of Computer Applications, 2016
SWIFFTX: A proposal for the SHA-3 standard
Y. Arbitman, Vadim Lyubashevsky
2008
This report describes the SWIFFTX hash function. It is part of our submission package to the SHA-3 hash function competition.
Improving SHA-2 Hardware Implementations
Lecture Notes in Computer Science, 2006
The Battle Against Security Attacks
2002
spongent: A Lightweight Hash Function
Cryptographic Hardware and Embedded Systems – CHES 2011, 2011
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Related papers
Advances in Security in Computing and Communications
Advances in Security in Computing and Communications
2021
Performance Analysis of Modified SHA-3
Procedia Technology, 2016
A Novel Authenticity of an Image Using Visual Cryptography
International Journal of Computer Science and Network, 2012
Architecture for the Secret-Key Bc3 Cryptography Algorithm
ITB Journal of Information and Communication Technology, 2011
The reconstruction and optimization of trie hashing functions
1983
Design of an Enhanced Cryptographic Hash Function-Digest Length 512 Bits
International Journal of Computer Applications
Cryptography: Recent Advances and Research Perspectives
IntechOpen eBooks, 2023
Securing Images by Secret Key Steganography
2012
Security & Privacy Threats, Attacks and Countermeasures in Internet of Things
International Journal of Network Security & Its Applications, 2019
International Journal of Advanced Computer Science and Applications, 2022
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
IEEE Transactions on Computers, 2013
Security of Information and Communication Technologies
FBIM Transactions, 2019
Advanced Communications and Multimedia Security
2002
A Visual Cryptography Based Digital Image Copyright Protection
Journal of Information Security, 2012
Secure and Verifiable (2, 2) Secret Sharing Scheme for Binary Images
2013
Cryptography: Against AI and QAI Odds
arXiv (Cornell University), 2023
Performance Analysis of SHA-2 and SHA-3 Finalists
Image Security With Different Techniques Of Cryptography And Coding: A Survey
IOSR Journal of Computer Engineering, 2014
A compact FPGA-based processor for the Secure Hash Algorithm SHA-256
Computers & Electrical Engineering, 2014
Related topics
Computer ScienceComputer SecurityTheoretical Computer ScienceRandomnessSecure Hash AlgorithmRandom permutation generationElectronics and TelecommunicationsCryptographic Hash FunctionHash FunctionSHA