Improving security of lightweith SHA-3 against preimage attacks (original) (raw)

Profile image of Zbigniew  KotulskiZbigniew Kotulski

International Journal of Electronics and Telecommunications

visibility

description

8 pages

link

1 file

Sign up for access to the world's latest research.

checkGet notified about relevant papers

checkSave papers to use in your research

checkJoin the discussion with peers

checkTrack your impact

Use of embedded FPGA resources in implementations of 14 round 2 SHA-3 candidates

Umar Malik

2011 International Conference on Field-Programmable Technology, 2011

View PDFchevron_right

Cryptographic Hash Functions and Attacks – A Detailed Study

ully fauziah

International Journal of Advanced Research in Computer Science, 2020

View PDFchevron_right

Detail Power Analysis of the SHA-3 Hashing Algorithm Candidates on Xilinx Spartan-3E

Amar Y . Jaffar

International Journal of Computer and Electrical Engineering, 2013

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Guilherme Morais

View PDFchevron_right

A Robust Review of SHA: Featuring Coherent Characteristics

Ghazal Obaid

2020

View PDFchevron_right

An Overview of Image Security Techiques

Ganga Holi

International Journal of Computer Applications, 2016

View PDFchevron_right

SWIFFTX: A proposal for the SHA-3 standard

Y. Arbitman, Vadim Lyubashevsky

2008

This report describes the SWIFFTX hash function. It is part of our submission package to the SHA-3 hash function competition.

View PDFchevron_right

Improving SHA-2 Hardware Implementations

Georgi Kuzmanov

Lecture Notes in Computer Science, 2006

View PDFchevron_right

The Battle Against Security Attacks

Katina Michael

2002

View PDFchevron_right

spongent: A Lightweight Hash Function

Deniz Toz

Cryptographic Hardware and Embedded Systems – CHES 2011, 2011

View PDFchevron_right

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

Advances in Security in Computing and Communications

MUFTAH FRAIFER

Advances in Security in Computing and Communications

View PDFchevron_right

Cryptography: A Review

Dr. Amosa Babalola

2021

View PDFchevron_right

Weak Bending of lightv

Miles Angelo Sodejana

View PDFchevron_right

Performance Analysis of Modified SHA-3

ebin m manuel

Procedia Technology, 2016

View PDFchevron_right

A Novel Authenticity of an Image Using Visual Cryptography

Prashant Koshta

International Journal of Computer Science and Network, 2012

View PDFchevron_right

Architecture for the Secret-Key Bc3 Cryptography Algorithm

Yusuf Hadi Kurniawan

ITB Journal of Information and Communication Technology, 2011

View PDFchevron_right

The reconstruction and optimization of trie hashing functions

Emde Boas

1983

View PDFchevron_right

Design of an Enhanced Cryptographic Hash Function-Digest Length 512 Bits

Aloysius Bampia Bangura

View PDFchevron_right

Hybrid Encryption based SHA2-256 Integration Techniques for High Security for Data Stored in Cloud Environment

keerti verma

International Journal of Computer Applications

View PDFchevron_right

Cryptography: Recent Advances and Research Perspectives

MONTHER TARAWNEH

IntechOpen eBooks, 2023

View PDFchevron_right

Securing Images by Secret Key Steganography

Mohammed Benabdellah

2012

View PDFchevron_right

Security & Privacy Threats, Attacks and Countermeasures in Internet of Things

Shams Siddiqui

International Journal of Network Security & Its Applications, 2019

View PDFchevron_right

A Data Security Algorithm for the Cloud Computing based on Elliptic Curve Functions and Sha3 Signature

Fatma Sbiaa

International Journal of Advanced Computer Science and Applications, 2022

View PDFchevron_right

SPONGENT: The Design Space of Lightweight Cryptographic Hashing

Deniz Toz

IEEE Transactions on Computers, 2013

View PDFchevron_right

Security of Information and Communication Technologies

Zoran Cekerevac

FBIM Transactions, 2019

View PDFchevron_right

Advanced Communications and Multimedia Security

Borka Jerman-Blazic

2002

View PDFchevron_right

A Visual Cryptography Based Digital Image Copyright Protection

Adel Abusitta

Journal of Information Security, 2012

View PDFchevron_right

Secure and Verifiable (2, 2) Secret Sharing Scheme for Binary Images

Sonali Patil

2013

View PDFchevron_right

Cryptography: Against AI and QAI Odds

Sheetal Harris

arXiv (Cornell University), 2023

View PDFchevron_right

Performance Analysis of SHA-2 and SHA-3 Finalists

Krishna Dahal

View PDFchevron_right

Image Security With Different Techniques Of Cryptography And Coding: A Survey

Ayman Hassanin

IOSR Journal of Computer Engineering, 2014

View PDFchevron_right

A compact FPGA-based processor for the Secure Hash Algorithm SHA-256

Ignacio Algredo Badillo

Computers & Electrical Engineering, 2014

View PDFchevron_right

Computer ScienceComputer SecurityTheoretical Computer ScienceRandomnessSecure Hash AlgorithmRandom permutation generationElectronics and TelecommunicationsCryptographic Hash FunctionHash FunctionSHA