搜索结果: 1-5 共查到“军事学 Shabal”相关记录5条 . 查询时间(0.062 秒)
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
Shabal low-weight pseudo collision attack preimage attack guess-and-determine technique SHA-3 competition
2010/8/17
This paper studies two types of attacks on the hash function Shabal. The first attack is a low-weight pseudo collision attack on Shabal. Since a pseudo collision attack is trivial for Shabal, we focus...
A Low-Area yet Performant FPGA Implementation of Shabal
implementation SHA-3 Shabal low area FPGA implementation
2010/7/13
In this paper, we present an efficient FPGA implementation of the SHA-3 hash function candidate Shabal. Targeted at the recent Xilinx Virtex-5 FPGA family, our design achieves a relatively high throug...
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash,ECHO, Fugue, Grstl, Hamsi, JH, Keccak,Lua, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009
SHA-3 round 2 hardware
2009/11/18
In this paper we describe our high-speed hardware implementations
of the 14 candidates of the second evaluation round of the
SHA-3 hash function competition. We synthesized all implementations
usin...
FPGA Implementations of SHA-3 Candidates:CubeHash, Grøstl, LANE, Shabal and Spectral Hash
FPGA SHA-3 Candidates CubeHash LANE
2009/7/14
Hash functions are widely used in, and form an
important part of many cryptographic protocols. Currently, a
public competition is underway to find a new hash algorithm(s)
for inclusion in the NIST ...
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers
Distinguishers Shabal Require Ideal Ciphers
2009/6/12
Shabal is based on a new provably secure mode of operation. Some related-key distinguishers
for the underlying keyed permutation have been exhibited recently by Aumasson et
al. and Knudsen et al., b...