搜索结果: 1-12 共查到“密码学 Skein”相关记录12条 . 查询时间(0.078 秒)
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
BLAKE Threefish Skein on FPGA
2013/4/18
The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based on the same arithm...
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
secret-key cryptography
2012/3/28
We present the new concept of biclique as a tool for preimage attacks, which employs many powerful techniques from differential cryptanalysis of block ciphers and hash functions. The new tool has prov...
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
SHA-2 SHA-256 SHA-512 Skein SHA-3 hash function meet-in-the-middle attack splice-and-cut preimage attack initial structure biclique.
2011/6/9
We introduce a new concept in splice-and-cut attacks on hash functions, which bridges the gap between preimage attacks and a powerful method of differential cryptanalysis. The new concept is called bi...
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256
Hash function Skein SHA-3
2012/3/29
The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designed based on the threefish block cipher and it only uses three primitive operations: modular addition, rotation ...
Rotational Rebound Attacks on Reduced Skein
Skein SHA-3 hash function compression function cipher rotational cryptanalysis rebound attack distinguisher
2010/10/26
In this paper we combine the recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approa...
AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS
SKEIN SHA-3 parallel cryptography secure communicating systems
2010/8/17
Recently, cryptanalysts have found collisions on the MD4, MD5, and SHA-0 algorithms; moreover, a method for finding SHA–1 collisions with less than the expected amount of work complexity has been publ...
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
Hash function Near-collision SHA-3 candidates Skein BLAKE
2010/7/14
The SHA-3 competition organized by NIST aims to find a new hash standard as a replacement of SHA-2. Till now, 14 submissions have been selected as the second round candidates, including Skein and BLAK...
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash,ECHO, Fugue, Grstl, Hamsi, JH, Keccak,Lua, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009
SHA-3 round 2 hardware
2009/11/18
In this paper we describe our high-speed hardware implementations
of the 14 candidates of the second evaluation round of the
SHA-3 hash function competition. We synthesized all implementations
usin...
The hash function Skein is the submission of Ferguson et
al. to the NIST Hash Competition, and is arguably a serious candidate
for selection as SHA-3. This paper presents the first third-party analy...
The hash function Skein is the submission of Ferguson et
al. to the NIST Hash Competition, and is arguably a serious candidate
for selection as SHA-3. This paper presents the first third-party analy...
Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein
SHA-3 ARIRANG BLAKE Skein
2009/7/22
The weakening of the widely used SHA-1 hash function
has also cast doubts on the strength of the related algorithms
of the SHA-2 family. The US NIST has therefore
initiated the SHA-3 competition in...
Skein is a submission to the NIST SHA-3 hash function com-
petition which has been optimized towards implementation in modern
64-bit processor architectures. This paper investigates the performance
...