搜索结果: 1-4 共查到“军事学 Sponge function”相关记录4条 . 查询时间(0.093 秒)
Conditional Cube Attack on Reduced-Round Keccak Sponge Function
Keccak-MAC Keyak cube tester
2016/12/10
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge function. As a notable...
We present the Bash family of hashing algorithms based on the sponge paradigm.
A core element of this family is the Bash-f sponge function which refers to the LRX (LogicalRotation-Xor)
class of symm...
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
Keccak SHA-3 sponge function
2016/1/23
In this paper we mount the cube attack on the Keccak sponge function. The cube attack, formally introduced in 2008, is an algebraic technique applicable to cryptographic primitives whose output can ...
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
Keccak SHA-3 sponge function
2016/1/7
In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak) against algebraic attacks. This analysis covers a wide range of key recovery, MAC forgery and other types of ...