The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase SHA-3 (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2006 (16) 2007-2008 (19) 2009 (45) 2010 (31) 2011 (28) 2012 (33) 2013 (30) 2014 (15) 2015 (33) 2016 (51) 2017 (57) 2018 (45) 2019 (54) 2020 (44) 2021 (34) 2022 (52) 2023 (70) 2024 (11)
Publication types (Num. hits)
article(293) incollection(2) inproceedings(371) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 74 occurrences of 31 keywords

Results
Found 713 publication records. Showing 668 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
70Mario Lamberger, Florian Mendel Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3
50Ryad Benadjila, Olivier Billet, Shay Gueron, Matthew J. B. Robshaw The Intel AES Instructions Set and the SHA-3 Candidates. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
50Bart Preneel The State of Hash Functions and the NIST SHA-3 Competition. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Vlastimil Klíma, Danilo Gligoroski Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
42Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin Linearization Framework for Collision Attacks: Application to CubeHash and MD6. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CubeHash and MD6, Hash functions, collisions, differential attack, SHA-3
36Nicolas Sklavos 0001 Multi-module Hashing System for SHA-3 & FPGA Integration. Search on Bibsonomy FPL The full citation details ... 2011 DBLP  DOI  BibTeX  RDF BLAKE, FPGA, VLSI, Hash Functions, SHA-3
34William E. Burr A New Hash Competition. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Kyungbae Jang, Sejin Lim, Yujin Oh, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo Quantum Implementation and Analysis of SHA-2 and SHA-3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
33Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Víctor Mateu, Yousof Al-Hammadi Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
33Yuta Akiya, Kyle Thomas Le, Megan Luong, Justin C. Wilson, Anas Salah Eddin, Valerio Formicola, Mohamed El-Hadedy 0001 SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems. Search on Bibsonomy ISSRE Workshops The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
33Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
33Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3. Search on Bibsonomy SAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Yusuke Naito 0001, Lei Wang 0031 Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Pal-Stefan Murvay, Bogdan Groza Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms. Search on Bibsonomy Int. J. Secur. Softw. Eng. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Franklin Magalhães Ribeiro Junior, Edward David Moreno, Wanderson Roger Azevedo Dias, Felipe dos Anjos Lima Cache performance analysis of SHA-3 hashing algorithm (BLAKE) and SHA-1. Search on Bibsonomy CLEI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31Dmitry Khovratovich Cryptanalysis of Hash Functions with Structures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF truncated differentials, Grindahl, Fugue, cryptanalysis, hash functions, structures, SHA-3
31Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer Rebound Attack on the Full Lane Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LANE, rebound attack, semi-free-start collision, cryptanalysis, hash function, SHA-3
30Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer Practical Collisions for SHAMATA-256. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHAMATA, hash function, collision attack, SHA-3 candidate
30Shuang Wu 0004, Dengguo Feng, Wenling Wu Cryptanalysis of the LANE Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rebound attack, LANE, hash function, collision attack, SHA-3 candidates
30Sebastiaan Indesteege, Bart Preneel Practical Collisions for EnRUPT. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF EnRUPT, hash function, collision attack, SHA-3 candidate
30Florian Mendel, Tomislav Nad A Distinguisher for the Compression Function of SIMD-512. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, SIMD, distinguisher, SHA-3 candidate
30Kota Ideguchi, Dai Watanabe Second Preimage Attack on SHAMATA-512. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHAMATA, hash function, second preimage attack, SHA-3 candidate
28Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann Meet-in-the-Middle Attacks on SHA-3 Candidates. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Praveen Gauravaram, Katsuyuki Okeya Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, side channel attacks, HMAC, Applied cryptography
23Eric Brier, Thomas Peyrin Cryptanalysis of CubeHash. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CubeHash, hash functions, collision
23Ray C. C. Cheung, Çetin Kaya Koç, John D. Villasenor A High-Performance Hardware Architecture for Spectral Hash Algorithm. Search on Bibsonomy ASAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette Practical Electromagnetic Template Attack on HMAC. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Florian Mendel, Christian Rechberger, Martin Schläffer Cryptanalysis of Twister. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Twister, hash function, collision-, preimage attack, SHA-3, second-preimage-
19Daniel J. Bernstein, Tanja Lange 0001, Ruben Niederhagen, Christiane Peters, Peter Schwabe FSBday. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Birthday, FSB - Wagner, not much Memory, SHA-3
18Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel Cryptanalysis of Dynamic SHA(2). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate
18Florian Mendel, Martin Schläffer On Free-Start Collisions and Collisions for TIB3. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-3 competition, TIB3, free-start collision, Hash function, collision attack
18Miroslav Knezevic, Ingrid Verbauwhede Hardware evaluation of the Luffa hash family. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Luffa hash algorithm, SHA-3 competition, ASIC implementations
16Alessandra Dolmeta, Maurizio Martina, Guido Masera Comparative Study of Keccak SHA-3 Implementations. Search on Bibsonomy Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Hachem Bensalem, Yves Blaquière, Yvon Savaria An Efficient OpenCL-Based Implementation of a SHA-3 Co-Processor on an FPGA-Centric Platform. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Argyrios Sideris, Minas Dasygenis Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA. Search on Bibsonomy Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Lorenzo Grassi 0001, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch Hash Functions Monolith for ZK Applications: May the Speed of SHA-3 be With You. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
16Nicky Mouha, Christopher Celi A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
16Alessandra Dolmeta, Maurizio Martina, Guido Masera Hardware architecture for CRYSTALS-Kyber post-quantum cryptographic SHA-3 primitives. Search on Bibsonomy PRIME The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Huimin Li 0004, Nele Mentens, Stjepan Picek Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions. Search on Bibsonomy DATE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Eros Camacho-Ruiz, Santiago Sánchez-Solano, Macarena C. Martínez-Rodríguez, Piedad Brox A complete SHA-3 hardware library based on a high efficiency Keccak design. Search on Bibsonomy NorCAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Zhongyi Zhang, Chengan Hou, Meicheng Liu Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials. Search on Bibsonomy EUROCRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Nicky Mouha, Christopher Celi A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms. Search on Bibsonomy CT-RSA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Takaki Asanuma, Takanori Isobe 0001 A Proof of Work based on Preimage Problem of Variants of SHA-3 with ASIC Resistance. Search on Bibsonomy J. Inf. Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Mesala M. Sravani, Ananiah Durai Sundararajan On Efficiency Enhancement of SHA-3 for FPGA-Based Multimodal Biometric Authentication. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Annapurna Kamadi, Zia Abbas Implementation of TRNG with SHA-3 for hardware security. Search on Bibsonomy Microelectron. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Batel Oved, Orian Leitersdorf, Ronny Ronen, Shahar Kvatinsky HashPIM: High-Throughput SHA-3 via Memristive Digital Processing-in-Memory. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Thibaut Vandervelden, Ruben de Smet, Kris Steenhaut, An Braeken SHA 3 and Keccak variants computation speeds on constrained devices. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Huimin Li 0004, Nele Mentens, Stjepan Picek Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
16Jian Guo 0001, Guozhen Liu, Ling Song 0001, Yi Tu Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
16Alan Torres-Alvarado, Luis Alberto Morales-Rosales, Ignacio Algredo-Badillo, Francisco López-Huerta, Mariana Lobato Báez, Juan Carlos López Pimentel An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Yavar Safaei Mehrabani, Roghayeh Ataie, Mohammad Hossein Shafiabadi, Abolghasem Ghasempour Design and implementation of an ASIP for SHA-3 hash algorithm. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov Finding Collisions against 4-Round SHA-3-384 in Practical Time. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Parker Hanson, Benjamin Winters, Eric Mercer, Brett Decker Verifying the SHA-3 Implementation from OpenSSL with the Software Analysis Workbench. Search on Bibsonomy SPIN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Jian Guo 0001, Guozhen Liu, Ling Song 0001, Yi Tu Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Batel Oved, Orian Leitersdorf, Ronny Ronen, Shahar Kvatinsky HashPIM: High-Throughput SHA-3 via Memristive Digital Processing-in-Memory. Search on Bibsonomy MOCAST The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Hojin Choi, Seog Chung Seo Fast Implementation of SHA-3 in GPU Environment. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Pietro Nannipieri, Matteo Bertolucci, Luca Baldanzi, Luca Crocetti, Stefano Di Matteo, Francesco Falaschi, Luca Fanucci, Sergio Saponara SHA2 and SHA-3 accelerator design in a 7 nm technology within the European Processor Initiative. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Jan Czajkowski Quantum Indifferentiability of SHA-3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
16Alivia Maraqonita Tillah, Dion Ogi, Mohammad Febriyanto, Devi Asria Farhatin Access Control System based on Secret Sharing Scheme with Secure Web Database and SHA-3 Password Authentication. Search on Bibsonomy IWBIS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Patrick Longa, Wen Wang 0007, Jakub Szefer The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. Search on Bibsonomy CRYPTO (3) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Jian Guo 0001, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song 0001 Practical Collision Attacks against Round-Reduced SHA-3. Search on Bibsonomy J. Cryptol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Patrick Longa, Wen Wang 0007, Jakub Szefer The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
16Dur-e-Shahwar Kundi, Ayesha Khalid, Arshad Aziz, Chenghua Wang, Máire O'Neill, Weiqiang Liu 0001 Resource-Shared Crypto-Coprocessor of AES Enc/Dec With SHA-3. Search on Bibsonomy IEEE Trans. Circuits Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Argyrios Sideris, Theodora Sanida, Minas Dasygenis High Throughput Pipelined Implementation of the SHA-3 Cryptoprocessor. Search on Bibsonomy ICM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Shih-Chun You, Markus G. Kuhn A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit Device. Search on Bibsonomy COSADE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16YoungBeom Kim, Hojin Choi, Seog Chung Seo Efficient Implementation of SHA-3 Hash Function on 8-Bit AVR-Based Sensor Nodes. Search on Bibsonomy ICISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Tao Zhou, Yongxin Zhu 0001, Naifeng Jing, Tianhao Nan, Wanyi Li, Bo Peng Reliable SoC Design and Implementation of SHA-3-HMAC Algorithm with Attack Protection. Search on Bibsonomy SmartCloud The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Pawel Morawiecki Malicious SHA-3. Search on Bibsonomy Fundam. Informaticae The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16S. Ehsan Hosiny Nezhad, Masoumeh Safkhani, Nasour Bagheri Relaxed Differential Fault Analysis of SHA-3. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Bernhard Jungk, Marc Stöttinger Serialized lightweight SHA-3 FPGA implementations. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Jian Guo 0001, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song 0001 Practical Collision Attacks against Round-Reduced SHA-3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
16José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira 0004, Alley Stoughton, Pierre-Yves Strub Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Pranav Gangwar, Neeta Pandey, Rajeshwari Pandey Novel Control Unit Design for a High-Speed SHA-3 Architecture. Search on Bibsonomy MWSCAS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Victor Arribas Beyond the Limits: SHA-3 in Just 49 Slices. Search on Bibsonomy FPL The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Karthikeyan Nagarajan, Sina Sayyah Ensan, Mohammad Nasim Imtiaz Khan, Swaroop Ghosh, Anupam Chattopadhyay SHINE: A Novel SHA-3 Implementation Using ReRAM-based In-Memory Computing. Search on Bibsonomy ISLPED The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Chengmo Yang, Zeyu Chen A Processing-In-Memory Implementation of SHA-3 Using a Voltage-Gated Spin Hall-Effect Driven MTJ-based Crossbar. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Sazzat Hossain, M. Sazzad Hussain, Romana Rahman Ema, Songita Dutta, Suborna Sarkar, Tajul Islam Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET. Search on Bibsonomy ICCCNT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Rajeev Sobti, G. Geetha 0001 Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex-M4 Processor. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Yi Yang, Debiao He, Neeraj Kumar 0001, Sherali Zeadally Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Jinli Rao, Tianyong Ao, Shu Xu, Kui Dai, Xuecheng Zou Design Exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V Processor. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Petr Zacek, David Malaník, Petra Holbikova, Roman Jasek, Lukas Kralik Using the SHA-3 to Derive Encryption Keys Based on Key-File. Search on Bibsonomy EECS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Ming Ming Wong, Jawad Haj-Yahya, Suman Sau, Anupam Chattopadhyay A New High Throughput and Area Efficient SHA-3 Implementation. Search on Bibsonomy ISCAS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16James Thesing, Dhireesha Kudithipudi Secure Neural Circuits to Mitigate Correlation Power Analysis on SHA-3 Hash Function. Search on Bibsonomy VLSID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Chun-Yi Chu, Marcin Lukowiak Two Step Power Attack on SHA-3 Based MAC. Search on Bibsonomy MIXDES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding Differential Fault Analysis of SHA-3 Under Relaxed Fault Models. Search on Bibsonomy J. Hardw. Syst. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Kevin Atighehchi, Alexis Bonnecaze Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
16B. Prathusha Laxmi, A. Chilambuchelvan GSR: Geographic Secured Routing using SHA-3 algorithm for node and message authentication in wireless sensor networks. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding Differential Fault Analysis of SHA-3 under Relaxed Fault Models. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
16Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl Algebraic Fault Analysis of SHA-3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
16Kevin Atighehchi, Alexis Bonnecaze Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16H. S. Jacinto, Luka Daoud, Nader Rafla 0001 High level synthesis using vivado HLS for optimizations of SHA-3. Search on Bibsonomy MWSCAS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Magnus Sundal, Ricardo Chaves Efficient FPGA Implementation of the SHA-3 Hash Function. Search on Bibsonomy ISVLSI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl Algebraic fault analysis of SHA-3. Search on Bibsonomy DATE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Jianwei Yang, Weizhen Wang, Zhicheng Xie, Jun Han 0003, Zhiyi Yu, Xiaoyang Zeng Parallel implementations of SHA-3 on a 24-core processor with software and hardware co-design. Search on Bibsonomy ASICON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Junhui Li, Liji Wu, Xiangmin Zhang An efficient HMAC processor based on the SHA-3 HASH function. Search on Bibsonomy ASICON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Magnus Sundal, Ricardo Chaves Improving FPGA based SHA-3 structures. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Debjyoti Bhattacharjee, Vikramkumar Pudi, Anupam Chattopadhyay SHA-3 implementation using ReRAM based in-memory computing architecture. Search on Bibsonomy ISQED The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Dur-e-Shahwar Kundi, Arshad Aziz A low-power SHA-3 designs using embedded digital signal processing slice on FPGA. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Muzaffar Rao, Thomas Newe, Ian Andrew Grout, Avijit Mathur High Speed Implementation of a SHA-3 Core on Virtex-5 and Virtex-6 FPGAs. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 668 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license