全部 |
  • 全部
  • 题名
  • 作者
  • 机构
  • 关键词
  • NSTL主题词
  • 摘要
检索 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Secure Transactions in IoT Network Using PINN-Based Intrusion Detection System and HDPoA Blockchain Protocol NSTL国家科技图书文献中心

Sourav Mishra |  Vijay Kumar Chaurasi... -  《Transactions on Emerging Telecommunications Technologies》 - 2025,36(4) - e70116~ - 共19页

摘要: the Keccak hashing function. The miner validates |  0.4 s, while the Keccak algorithm takes 0.3 s for | IoT is a rapidly developing technology with a |  wealth of creative application possibilities. However | , IoT wireless sensor networks are vulnerable to
关键词: Blockchain |  Homomorphic variable tag generation |  Honesty-based distributed proof-of-authority (HDPoA) |  Internet of things |  Intrusion detection system (IDS) |  Keccak hashing |  Variational auto-encoder

2. ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA NSTL国家科技图书文献中心

Xinyi Ji |  Jiankuo Dong... -  《IEEE Transactions on Computers》 - 2025,74(2) - 401~413 - 共13页

摘要:-consuming operations are Keccak and polynomial |  propose a better scheduling strategy for Keccak, which |  RISC-V architecture. Our 24-round Keccak permutation |  (Keccak-$p$[1600,24]) achieves a 59.18% speed-up | The field of post-quantum cryptography (PQC
关键词: Arithmetic |  Cryptography |  Computer architecture |  Polynomials |  NIST |  Standards |  Encapsulation |  Computers |  Software algorithms |  Single instruction multiple data

3. Pseudorandom bit generation with asymmetric numeral systems NSTL国家科技图书文献中心

Pieprzyk, Josef |  Pawlowski, Marcin... -  《International Journal of Information Security》 - 2025,24(2) - 共18页

摘要: permute output bits using rotation and Keccak | The generation of pseudorandom binary |  sequences is of great importance in numerous applications | , ranging from simulation and gambling to cryptography | . Pseudorandom bit generators (PRBGs) can be divided into two
关键词: Pseudorandomness |  Entropy encoding |  Compression |  Asymmetric numeral systems |  Indistinguishability |  ANS |  PRBG

4. Simple vs. vectorial: exploiting structural symmetry to beat the ZeroSum distinguisher NSTL国家科技图书文献中心

Sahiba Suryawanshi |  Shibam Ghosh... -  《Designs,codes and crytography》 - 2025,93(1) - 133~174 - 共42页

摘要: Xoodyak. As regards Keccak-p, the internal permutation | Higher order differential properties |  constitute a very insightful tool at the hands of a crypt | -analyst allowing for probing a cryptographic primitive |  from an algebraic perspective. In FSE 2017, Saha et
关键词: Boolean derivative |  SymSum distinguisher |  Hash function |  SHA-3 |  Xoodyak |  Bash

5. Automatic Search of Linear Structure: Applications to Keccak and ASCON NSTL国家科技图书文献中心

Huina Li |  Guozhen Liu... -  《Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II》 -  International Conference on Information Security and Cryptology - 2024, - 172~192 - 共21页

摘要: the preimage attacks on Keccak. This technique |  permutation of Keccak for up to 2.5 rounds with significant |  linear structures on Keccak relied solely on manual | , we find Guo et al.'s structures on Keccak-224/-256 | -/3-round Keccak-512 from 2~(384)/2~(482) to 2~(365
关键词: Keccak |  Ascon |  SAT |  Linear structure |  Preimage attack |  Zero-sum distinguisher

6. Design and Performance Evaluation of a Novel High-Speed Hardware Architecture for Keccak Crypto Coprocessor NSTL国家科技图书文献中心

Mustafa Sanli -  《International Journal of Parallel Programming》 - 2024,52(5/6) - 367~379 - 共13页

摘要:The Keccak algorithm plays a significant role | -performance hardware architecture for the Keccak algorithm |  architecture exploits existing parallelisms in the Keccak |  Keccak algorithm's structure and building blocks, we |  in ensuring the security and confidentiality of
关键词: FPGA |  Keccak |  Hash function |  Embedded system

7. Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes NSTL国家科技图书文献中心

Julien Maillard |  Thomas Hiscock... -  《21st International Conference on Security and Cryptography》 -  International Conference on Security and Cryptography - 2024, - 518~527 - 共10页

摘要:Keccak is a standard hashing algorithm that is |  simulation framework, we extend existing work on the Keccak |  classification accuracy required for successful SASCA on Keccak. |  used in cryptographic protocols as Pseudo Random |  Functions (PRF), as Pseudo Random Number Generator (PRNG
关键词: Keccak |  Side-Channel attacks |  SASCA |  Kyber |  Dilithium

8. Optimizing AES-256 with Keccak Permutations: Achieving High Security and Performance with Reduced Rounds NSTL国家科技图书文献中心

Ma. Esther B. Chio |  Ariel M. Sison... -  《2024 15th International Conference on Information and Communication Technology Convergence》 -  International Conference on Information and Communication Technology Convergence - 2024, - 2131~2136 - 共6页

摘要: Keccak permutation into its key generation process |  reducing the number of encryption rounds. Keccak-enhanced |  Keccak-enhanced variant achieved a 25% reduction in |  security. The results suggest that Keccak-enhanced AES | This study introduces an innovative approach
关键词: Resistance |  Power demand |  Sensitivity |  Government |  Side-channel attacks |  Medical services |  Entropy |  Encryption |  Information and communication technology |  Standards

9. An Enhanced AES256 Key Generation Process with Keccak-F Permutation Method NSTL国家科技图书文献中心

Ma. Esther B. Chio |  Ariel M. Sison... -  《2024 5th International Conference on Information Technology and Education Technology》 -  International Conference on Information Technology and Education Technology - 2024, - 74~80 - 共7页

摘要: Keccak-f permutation into the key generation process | Amidst the escalating cybersecurity challenges |  of 2023, our study introduces an innovative method |  to strengthen AES256 encryption by integrating the | . Validated by NIST SP 80022, our approach enhances AES 256
关键词: Technological innovation |  Systematics |  Correlation |  Data security |  Data protection |  Entropy |  Encryption |  Internet of Things |  Computer security |  Resilience

10. LOKI Low-Latency Open-Source Kyber-Accelerator IPs NSTL国家科技图书文献中心

Alessandra Dolmeta |  Mattia Mirigaldi... -  《Applications in Electronics Pervading Industry, Environment and Society: Conference on Applications in Electronics Pervading Industry, Environment and Society (APPLEPIES 2023), September 2023, Genova, Italy》 -  Conference on Applications in Electronics Pervading Industry, Environment and Society - 2024, - 29~35 - 共7页

摘要:CRYSTALS-Kyber is a lattice-based key |  encapsulation mechanism (KEM) recognized as one of the |  finalist algorithms in NIST's post-quantum cryptography |  (PQC) standardization process. Polynomial |  multiplications and hash functions, as essential operations in
关键词: Hardware design |  Accelerator |  Security |  Post-quantum cryptography |  CRYSTALS-Kyber |  Keccak |  NTT |  RISC-Ⅴ
检索条件Keccak

NSTL主题词

  • NSTL学科导航