• Keccak

  • Referenced in 82 articles [sw09834]
  • scope of the SHA-3 contest, we proposed the largest permutation, namely Keccak...
  • Quark

  • Referenced in 22 articles [sw08447]
  • satisfactory security and performance. The ongoing SHA-3 Competition will not help, as it concerns...
  • CubeHash

  • Referenced in 13 articles [sw07100]
  • hash function CubeHash, one of the SHA-3 second round candidates. We apply two methods...
  • ATHENa

  • Referenced in 7 articles [sw29717]
  • Cryptographic algorithms, e.g. candidates in the SHA-3 and CAESAR contests; Cryptographic architectures and implementations...
  • Whirlwind

  • Referenced in 4 articles [sw06748]
  • algorithms submitted to the SHA-3 competition, Whirlwind takes recent developments in cryptanalysis into account ... with the 512-bit versions of SHA-3 candidates such as LANE or the original...
  • SWIFFTX

  • Referenced in 5 articles [sw40751]
  • candidates of SHA-3 Hash Competition that uses the number theoretic transform...
  • XKCP

  • Referenced in 4 articles [sw36433]
  • SHAKE extendable-output functions and SHA-3 hash functions from FIPS 202, the cSHAKE, KMAC...
  • Romulus

  • Referenced in 4 articles [sw41025]
  • sponge method derived from the SHA-3 standard (Keccak), Romulus takes a more traditional approach...
  • PQM4

  • Referenced in 4 articles [sw34496]
  • spent in symmetric primitives (SHA-2, SHA-3, AES); integration of clean implementations from PQClean...
  • CryptLogVer

  • Referenced in 3 articles [sw13253]
  • Security margin evaluation of SHA-3 contest finalists through SAT-based attacks: Toolkit CryptLogVer...
  • TinyGarble

  • Referenced in 3 articles [sw41619]
  • never been reported before, such as SHA-3. Finally, our sequential description enables...
  • SAMOSA

  • Referenced in 1 article [sw09725]
  • permutations of the SHA-3 finalist Grøstl. Based on our analysis we claim that ... SAMOSA to compare it with the SHA-3 finalists. In our implementations, SAMOSA family consistently...
  • McEliece

  • Referenced in 251 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • HAVAL

  • Referenced in 45 articles [sw02156]
  • HAVAL is a cryptographic hash function. Unlike MD5...
  • X-FCSR

  • Referenced in 8 articles [sw02717]
  • X-FCSR -- a new software oriented stream cipher...
  • SPARK

  • Referenced in 48 articles [sw03124]
  • Using the SPARK toolset for showing the absence...
  • CUDA

  • Referenced in 1325 articles [sw03258]
  • The NVIDIA® CUDA® Toolkit provides a comprehensive development...
  • z3

  • Referenced in 597 articles [sw04887]
  • Z3 is a high-performance theorem prover being...
  • Alt-Ergo

  • Referenced in 16 articles [sw04888]
  • Alt-Ergo is an automatic theorem prover dedicated...
  • Trivium

  • Referenced in 79 articles [sw06150]
  • TRIVIUM is a hardware oriented synchronous stream cipher...