期刊文献+

SHA-3获胜算法:Keccak评析 被引量:3

A Short Review on SHA-3 Winner:Keccak
下载PDF
导出
摘要 2012年10月初NIST确定SHA-3获胜算法为Keccak,为此该算法目前成为人们关注的焦点。本文对Keccak算法的实现过程、性能特点、获胜理由和攻击现状等进行了简评。通过这些介绍可达到初步了解Keccak的目的。 Since NIST claimed Keccak was the winner of SHA - 3 Competition on October 2012 ; this algorithm has become the focus of attentions. In this paper a brief discussion given on algorithmic procedures, properties, winning advantages and security status about Keccak. Through analysis, we can have a better understanding of Keccak.
出处 《北京电子科技学院学报》 2013年第2期18-23,共6页 Journal of Beijing Electronic Science And Technology Institute
基金 北京电子科技学院重点实验室项目支持
关键词 HASH函数 SHA-3 KeccakSponge Hash Function SHA - 3 Keccak Sponge 7 the the
  • 相关文献

参考文献11

  • 1G. Bertoni, et al, The Keccak Reference, Januar- y, 2011, http ://Keccak. noekeon, org.
  • 2G. Bertoni, J. Daemen et al, Cryptographic sponge functions, January, 2011, http :// sponge, noekeon, org/.
  • 3Shu- jen Chang, et al, Third -Round Report of the SHA- 3 Cryptographic Hash Algorithm Com- petition, November, 2012, http://dx, doi. org/ 10. 6028/NIST. IR. 7896.
  • 4I. Dinur, O. Dunkelman and A. Shamir, New at- tacks on Keccak - 224 and Keccak - 256, FSE' 2012, 2012.
  • 5I. Dinur, O. Dunkelman and A. Shamir, Collision Attacks on Up to 5 Rounds of SHA - 3Using Gen- eralized Internal Differentials, FSE'2013, 2013.
  • 6A. Due, J. Guo, T. Peyrin and L. Wei, Unaligned Rebound Attack: Application to Keeeak, FSE' 2012, 2012.
  • 7J. Daemen and G Van Assche, Differential Propa- gation analysis of Kecaak, FSE'2012, 2012.
  • 8M. Naya- Plasencia, A. Reock, and W. Meier, Practical Analysis of Reduced - Round Keccak, INDOCRYPT 2011, 2011.
  • 9C. Boura and A. Canteaut, Zero -Sum Distin- guishers for Iterated Permutations and Application to Keccak - f and Hamsi - 256, SAC' 2010, 2010.
  • 10C. Boura, A. Canteaut and C. De Canniere,Higher - order differential properties of Keccak and Luffa, FSE'2011, 2011.

同被引文献18

  • 1WANG Xiaoyun,FENG Dengguo,YU Xiuyuan.An attack on hash function HAVAL-128[J].Science in China(Series F),2005,48(5):545-556. 被引量:9
  • 2Bertoni G, Daemenet J. Cryptographic sponge functionsEB/ OLd. E2011-01-05]. http,//sponge, noekeon, org/CSF-0. 1. pdf.
  • 3Bertoni G, Daemenet J. The Keccak sponge function family [EB/OL]. [2014-05-10]. http://Keccak, noekeon, org.
  • 4Morawieeki P, Pieprzykand J, Srebrny M. Rotational crypt- analysis of round-reduced KeccakEEB/OLT. [2012-12-18"] . http://eprint, iaer. org.
  • 5Naya-Plaseneia M, Rock A, Meier W. Practical analysis of reduced-round Keeeak [C]// International Conference on Cryptology in India. Chennai, India: Springer-Verlag Berlin, 2011: 236-254.
  • 6Provelengios G, Kitsos P, Sklavos N. FPGA-based design approaches of Keccak Hash functionI-C]//Euromicro Confer- ence Digital System Design. Izmir: IEEE , 2012 648-653.
  • 7陈荣,赵曙光.基于图像密钥的高速图像加密算法及其相关协议[c]//江苏省通信学会2004年学术年会论文集.南京:江苏省通信学会,2004:104-113.
  • 8Liu Zhi, Le Meur, Luo Shuhua. Superpixel-based saliency detection[C]// IEEE Conference on Computer Vision and Pattern Recognition. Paris: IEEE, 2013: 1-4.
  • 9Bayat-Sarmadi S, Mozaffari-Kermani M, Reyhani -Masoleh A. Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm[J]. IEEE Computer-Aided Design of Integrated Circuits and Systems, 2014, 33 (7) 1105-1109.
  • 10薛宇,吴文玲,王张宜.SHA-3杂凑密码候选算法简评[J].中国科学院研究生院学报,2009,26(5):577-586. 被引量:5

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部