Single-Trace Attacks on Keccak
Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has found a large number of applications. It is, for instance, a common building block in schemes submitted to NIST’s post-quantum cryptography project. In many of these applications, Keccak processes ephemera...
Main Authors: | Matthias J. Kannwischer, Peter Pessl, Robert Primas |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2020-06-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/8590 |
Similar Items
-
Algebraic Collision Attacks on Keccak
by: Rachelle Heim Boissier, et al.
Published: (2021-03-01) -
Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]
by: Xiaoen Lin, et al.
Published: (2025-03-01) -
New Conditional Cube Attack on Keccak Keyed Modes
by: Zheng Li, et al.
Published: (2019-06-01) -
Improved Preimage Attacks on 3-Round Keccak-224/256
by: Xiaoen Lin, et al.
Published: (2021-09-01) -
Improved Preimage Attacks on 4-Round Keccak-224/256
by: Le He, et al.
Published: (2021-03-01)