Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to de...
Main Author: | Artur Hłobaż |
---|---|
Format: | Article |
Language: | English |
Published: |
Polish Academy of Sciences
2022-03-01
|
Series: | International Journal of Electronics and Telecommunications |
Subjects: | |
Online Access: | https://journals.pan.pl/Content/122802/PDF/8-3581-H%C5%82oba%C5%BC_sk_new.pdf |
Similar Items
-
Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System
by: Osama Ahmed Khashan
Published: (2020-01-01) -
Design of new block and stream cipher encryption algorithms for data security /
by: 217869 Tuan Sabri Tuan Mat @ Tuan Muhammad
Published: (2000) -
Secure file transfer using twofish encryption /
by: 293205 Mohd. Azlishah Othman
Published: (2003) -
Brute force : cracking the data encryption standard /
by: 369023 Curtin, Matt
Published: (2005) -
Digital design of the encryption hardware based on twofish algorithm /
by: 422176 Firdaus Kamarudin
Published: (2003)