×

Found 3 Documents (Results 1–3)

A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms. (English) Zbl 07745599

Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 3-28 (2023).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes. (English) Zbl 07497444

Hong, Deukjo (ed.), Information security and cryptology – ICISC 2020. 23rd international conference, Seoul, South Korea, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12593, 140-154 (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Faster multiplication in \(\mathbb{Z}_{2^m}[x]\) on Cortex-M4 to speed up NIST PQC candidates. (English) Zbl 1458.94246

Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 281-301 (2019).
MSC:  94A60 68M07
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Year of Publication

Main Field

all top 3

Software