搜索结果: 1-8 共查到“军事学 ECHO”相关记录8条 . 查询时间(0.484 秒)
Improved Analysis of ECHO-256
secret-key cryptography / hash function cryptanalysis rebound attack collision attack distinguisher
2012/3/27
ECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-based hash function that has attracted a lot of interest and analysis. Up to now, the best known attacks were a distinguishe...
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO
implementation / AES ECHO hash functions implementation SHA-3
2012/3/29
We propose a compact coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function ECHO on Virtex-$5$ and Virtex-$6$ FPGAs. Our architecture is built around a...
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO
AES ECHO hash functions implementation SHA-3
2011/2/24
We propose a compact coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function ECHO on Virtex-$5$ and Virtex-$6$ FPGAs. Our architecture is built around a...
Improved Collisions for Reduced ECHO-256
hash functions SHA-3 competition ECHO cryptanalysis truncated differential path rebound attack collision attack
2010/11/22
In this work, we present a collision attack on 5/8 rounds of the ECHO-256 hash function with a complexity of $2^{112}$ in time and $2^{85.3}$ memory. In this work, we further show that the merge inbou...
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Cryptanalysis Hash Functions SHA-3 ECHO-256 Collision attack
2010/11/10
In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to four rounds in 2^52 ope...
A Compact FPGA Implementation of the SHA-3 Candidate ECHO
Implementation the SHA-3 Candidate ECHO
2010/7/14
We propose a compact architecture of the SHA-3 candidate ECHO for the Virtex-5 FPGA family. Our architecture is built around a 8-bit datapath. We show that a careful organization of the chaining varia...
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
hash functions SHA-3 competition ECHO cryptanalysis truncated differential paths rebound attack subspace distinguisher near-collisions collision attack
2010/7/13
In this work we present the first results for the ECHO hash function. We provide a subspace distinguisher for 5/8 rounds, near-collisions on 4.5/8 rounds and collisions for 4/8 rounds of the ECHO-256 ...
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash,ECHO, Fugue, Grstl, Hamsi, JH, Keccak,Lua, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009
SHA-3 round 2 hardware
2009/11/18
In this paper we describe our high-speed hardware implementations
of the 14 candidates of the second evaluation round of the
SHA-3 hash function competition. We synthesized all implementations
usin...