1
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... for cryptanalysis -- New designs -- Keccak...

2
Published 2014
Springer International Publishing
Table of Contents: ...-Round Keccak -- Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry -- Preimage...

3
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Protocols -- The Poulidor Distance-Bounding Protocol -- A Lightweight Implementation of Keccak Hash Function...

4
Published 2018
Springer International Publishing
Table of Contents: ...-Resistance for AES: How Cheap Can We Go -- Cryptanalysis of 1-Round KECCAK -- Performing Computations...

5
Published 2015
Springer International Publishing
Table of Contents: ... -- Countermeasures -- Faster Mask Conversion with Lookup Tables -- Towards Evaluating DPA Countermeasures for Keccak...

6
Published 2021
Springer Nature Singapore
Table of Contents: ... -- Impact Analysis of Black Hole, Flooding Attacks and Enhancements inMANET Using SHA3 Keccak...

7
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... -- Differential Cryptanalysis of Keccak Variants -- Recovering Private Keys Generated with Weak PRNGs...

8
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... Based on Small-Bias Probability Spaces -- Cryptanalysis -- Differential Power Analysis of MAC-Keccak...

9
Published 2022
Springer International Publishing
Table of Contents: ... with Dynamic Taint Analysis.-Security Analysis of Hash Algorithm Preimage Attacks on 4-round Keccak by Solving...

10
Published 2015
Springer International Publishing
Table of Contents: ... in Schematics of Systems -- S-DILS: Framework for Secured Digital Interaction Learning System Using Keccak...

11
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function -- Twisted Polynomials...

12
Published 2019
Springer International Publishing
Table of Contents: ... cryptanalytic results on TRIAD -- Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures -- Protocols...

13
Published 2024
Springer Nature Singapore
Table of Contents: ...: Applications to Keccak and Ascon -- Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128 --...

14
by Wu, Xun, Wu, Bridget
Published 2023
Apress L. P.
Table of Contents: ... Work -- Digital Signatures -- Hash Algorithms -- The Keccak-256 Algorithm...

15
Published 2014
Springer International Publishing
Table of Contents: ... of Keccak-f hash algorithm -- Distributed time management in Wireless Sensor Networks -- Heuristic Cycle...

16
by Antonopoulos, Andreas M., Wood, Gavin
Published 2018
O'Reilly Media, Inc.
Table of Contents: ...; Elliptic Curve Libraries; Cryptographic Hash Functions; Ethereum's Cryptographic Hash Function: Keccak-256...