Keyword : SHA-3


Design Exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V Processor
Jinli RAO Tianyong AO Shu XU Kui DAI Xuecheng ZOU 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11 ; pp. 2698-2705
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
SHA-3application specific instruction-set processorRISC-VIoT
 Summary | Full Text:PDF

Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta
Yu SASAKI Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 141-149
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
integral attackmiddletext distinguisherknown-keychosen-keyLesamntahashSHA-3
 Summary | Full Text:PDF

Design Approach and Implementation of Application Specific Instruction Set Processor for SHA-3 BLAKE Algorithm
Yuli ZHANG Jun HAN Xinqian WENG Zhongzhu HE Xiaoyang ZENG 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2012/08/01
Vol. E95-C  No. 8 ; pp. 1415-1426
Type of Manuscript:  PAPER
Category: Electronic Circuits
Keyword: 
SHA-3BLAKE algorithmISEASIP
 Summary | Full Text:PDF

Cryptanalyses of Double-Mix Merkle-Damgård Mode in the Original Version of AURORA-512
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 121-128
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
AURORASHA-3DMMDcollisionsecond preimageHMAC
 Summary | Full Text:PDF