-
1
Fast Implementation of SHA-3 in GPU Environment
Published 2021-01-01Subjects: “…Secure Hash Algorithm (SHA)-3…”
Get full text
Article -
2
Comparative Study of Keccak SHA-3 Implementations
Published 2023-11-01Subjects: Get full text
Article -
3
Optimization of preimage resistance on SHA-3 algorithm(SHA-3算法的抗原象攻击性能优化)
Published 2016-01-01Subjects: “…sha-3算法…”
Get full text
Article -
4
Hash function of finalist SHA-3: analysis study
Published 2013“…Therefore, the goal of the NIST contenders in SHA-3 between the hash functions is to be chosen as the winner in the end of 2012, and the beginning of 2013. …”
Get full text
Article -
5
Improving security of lightweith SHA-3 against preimage attacks
Published 2018-05-01Subjects: Get full text
Article -
6
Practical collision attacks against round-reduced SHA-3
Published 2019“…The Keccak hash function is the winner of the SHA-3 competition (2008–2012) and became the SHA-3 standard of NIST in 2015. …”
Get full text
Get full text
Journal Article -
7
Hashing technique based on SHA-3 using chaotic maps1
Published 2020-03-01“…Performance testing showed 60 % enhancement in comparison with plain SHA-3.…”
Get full text
Article -
8
Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA
Published 2023-08-01Subjects: Get full text
Article -
9
Finding Collisions against 4-Round SHA-3-384 in Practical Time
Published 2022-09-01Subjects: “…SHA-3 hash function…”
Get full text
Article -
10
Improving the security of mobile IPV6 signalling using KECCAK / SHA-3
Published 2021“…The experimental result showed that the SHA-3 algorithm could fulfil the requirements. It can enhance security performance and, at the same time, does not lengthen the authentication time significantly.…”
Get full text
Get full text
Article -
11
Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks
Published 2018-01-01“…We evaluate the sensor area of the proposed SHA-3 implementation and compare it with other recently proposed hardware implementations of SHA-3. …”
Get full text
Article -
12
Improved Low-Depth SHA3 Quantum Circuit for Fault-Tolerant Quantum Computers
Published 2023-03-01Subjects: Get full text
Article -
13
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…The objective of this project is to design a synthesizable SHA-3 with 256-bits hash output and 1600-bits state array with lower area compared to Intel Microelectronic SHA-3. …”
Get full text
Thesis -
14
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy
Published 2022-04-01Subjects: “…SHA-3…”
Get full text
Article -
15
Penerapan Keamanan WSN Berbasis Algoritma RSA 2048 dan SHA-3 pada Pemantauan Suhu
Published 2021-01-01Subjects: Get full text
Article -
16
Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image
Published 2022-10-01Subjects: Get full text
Article -
17
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
Published 2022-03-01“…The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. …”
Get full text
Article -
18
Parallel and High Speed Hashing in GPU for Telemedicine Applications
Published 2018-01-01Subjects: Get full text
Article -
19
Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
Published 2015-07-01“…An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud.…”
Get full text
Article -
20
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions
Published 2022-11-01“…We also conducted a comparative analysis between two hash functions, SHA-2 and SHA-3, and assessed the feasibility of the proposed protocol in the forthcoming 6G technology. …”
Get full text
Article