Analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method
Abstract
Full Text:
PDFReferences
Chang, S. H., Ray A. Perlner, W. Burr, M. Turan, J. Kelsey, S. Paul and Lawrence E. Bassham. “Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition.” (2012), http://dx.doi.org/10.6028/NIST.IR.7896.
Preneel B., Davies-Meyer hash function. In van Tilborg, H.C.A., ed.: Encyclopedia of Cryptography and Security, Boston, MA, pp. 136-146, Springer US, 2005.
National Institute of Standards and Technology: Secure hash standard (shs). Technical report, NIST, 2008.
https://www.cryptopp.com/benchmarks.html
Aumasson JP., Meier W., Phan R.CW., Henzen L. (2014) Specification of BLAKE. In: The Hash Function BLAKE. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44757-4_3
Grøstl documentation: https://www.groestl.info/groestl-implementation-guide.pdf
JH documentation: https://www3.ntu.edu.sg/home/wuhj/research/jh/jh_round3.pdf
Keccak documentation: https://keccak.team/keccak_specs_summary.html
Skein documentation: https://www.schneier.com/wp-content/uploads/2015/01/skein.pdf
BLAKE2 documentation: https://www.blake2.net/blake2.pdf
O’Connor J., Aumasson J.-P., Neves S., Wilcox-O’Hearn Z, BLAKE3 one function, fast everywhere: https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blake3.pdf
I. F. Alshaikhli, M. A. Alahmad and K. Munthir, "Comparison and Analysis Study of SHA-3 Finalists," 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, 2012, pp. 366-371, doi: 10.1109/ACSAT.2012.64.
D. Bernstein and T. Lange (editors), eBASH: ECRYPT Benchmarking of All Submitted Hashes, http://bench.cr.yp.to/ebash.html
External Benchmarking Extension (XBX), http://xbx.das-labor.org/trac
Announcing Approval of Federal Information Processing Standard (FIPS) 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, and Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard:
https://www.federalregister.gov/documents/2015/08/05/2015-19181/announcing-approval-of-federal-information-processing-standard-fips-202-sha-3-standard
Refbacks
- There are currently no refbacks.
International Journal of Electronics and Telecommunications
is a periodical of Electronics and Telecommunications Committee
of Polish Academy of Sciences
eISSN: 2300-1933