搜索结果: 1-9 共查到“军事学 SHA-3 Candidates”相关记录9条 . 查询时间(0.04 秒)
Comparison of seven SHA-3 candidates software implementations on smart cards
seven SHA-3 candidates software implementations smart cards
2010/10/20
In this work, we present and compare seven SHA-3 second-round candidates implementations on two different architectures used on smart cards: the Intel 8051 and the ARM7TDMI. After presenting the perfo...
Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
hash functions SHA-3 FPGA benchmarking
2010/8/24
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an evaluation should be ...
Side-channel Analysis of Six SHA-3 Candidates
side-channel hash function cryptanalysis HMAC SHA-3
2010/8/24
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to pe...
Security Reductions of the Second Round SHA-3 Candidates
secret-key cryptography hash functions security
2010/7/14
In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities identified in existing hash functio...
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII
Hardware Performance SHA-3 Candidates SASEBO-GII
2010/1/18
As a result of extensive analyses on cryptographic hash functions,
NIST started an open competition for selecting a new standard
hash function SHA-3. One important aspect of this competition is in
...
Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein
SHA-3 ARIRANG BLAKE Skein
2009/7/22
The weakening of the widely used SHA-1 hash function
has also cast doubts on the strength of the related algorithms
of the SHA-2 family. The US NIST has therefore
initiated the SHA-3 competition in...
FPGA Implementations of SHA-3 Candidates:CubeHash, Grøstl, LANE, Shabal and Spectral Hash
FPGA SHA-3 Candidates CubeHash LANE
2009/7/14
Hash functions are widely used in, and form an
important part of many cryptographic protocols. Currently, a
public competition is underway to find a new hash algorithm(s)
for inclusion in the NIST ...
A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs
RAM Requirements Various SHA-3 Candidates Low-cost 8-bit CPUs
2009/6/15
In this paper, we compare the implementation costs of various
SHA-3 candidates on low-cost 8-bit CPUs by estimating RAM/ROM
requirements of them. As a first step toward this kind of research, in
ou...
In this note we give an overview on the current state of the SHA-3 candidates. First, we
classify all publicly known candidates and, second, we outline and summarize the performance data as
given in...