Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(SHA 3). Showing records 1 – 19 of 19 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


George Mason University

1. Gurung, Smriti. Lightweight Implementations of the SHA-3 Finalist Keccak on FPGAs .

Degree: 2012, George Mason University

 The Secure Hash Algorithm (SHA) is a cryptographic hash function published by the National Institute of Standard and Technology (NIST) as a U.S Federal Information… (more)

Subjects/Keywords: Keccak; SHA-3; lightweight; FPGA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gurung, S. (2012). Lightweight Implementations of the SHA-3 Finalist Keccak on FPGAs . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/7900

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gurung, Smriti. “Lightweight Implementations of the SHA-3 Finalist Keccak on FPGAs .” 2012. Thesis, George Mason University. Accessed August 06, 2020. http://hdl.handle.net/1920/7900.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gurung, Smriti. “Lightweight Implementations of the SHA-3 Finalist Keccak on FPGAs .” 2012. Web. 06 Aug 2020.

Vancouver:

Gurung S. Lightweight Implementations of the SHA-3 Finalist Keccak on FPGAs . [Internet] [Thesis]. George Mason University; 2012. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/1920/7900.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gurung S. Lightweight Implementations of the SHA-3 Finalist Keccak on FPGAs . [Thesis]. George Mason University; 2012. Available from: http://hdl.handle.net/1920/7900

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

2. Ohnút, Petr. Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA.

Degree: 2020, Brno University of Technology

This Bachelors's thesis is focused on the description of SHA3 algorithm, an FPGA technology, and the possibility to implement the SHA3 algorithm into FPGA. It also deals with our design and implementation in Python and VHDL. Advisors/Committee Members: Valach, Soběslav (advisor), Macho, Tomáš (referee).

Subjects/Keywords: FPGA; Kryptografie; SHA-3; FPGA; Cryptography; SHA-3

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ohnút, P. (2020). Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/190626

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ohnút, Petr. “Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA.” 2020. Thesis, Brno University of Technology. Accessed August 06, 2020. http://hdl.handle.net/11012/190626.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ohnút, Petr. “Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA.” 2020. Web. 06 Aug 2020.

Vancouver:

Ohnút P. Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/11012/190626.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ohnút P. Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/190626

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

3. Huang, Sinan. Hardware Evaluation of SHA-3 Candidates.

Degree: MS, Electrical and Computer Engineering, 2011, Virginia Tech

 Cryptographic hash functions are used extensively in information security, most notably in digital authentication and data integrity verification. Their performance is an important factor of… (more)

Subjects/Keywords: Cryptography; Security; SHA-3; Hardware Evaluation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, S. (2011). Hardware Evaluation of SHA-3 Candidates. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/32932

Chicago Manual of Style (16th Edition):

Huang, Sinan. “Hardware Evaluation of SHA-3 Candidates.” 2011. Masters Thesis, Virginia Tech. Accessed August 06, 2020. http://hdl.handle.net/10919/32932.

MLA Handbook (7th Edition):

Huang, Sinan. “Hardware Evaluation of SHA-3 Candidates.” 2011. Web. 06 Aug 2020.

Vancouver:

Huang S. Hardware Evaluation of SHA-3 Candidates. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/10919/32932.

Council of Science Editors:

Huang S. Hardware Evaluation of SHA-3 Candidates. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/32932


George Mason University

4. Vadlamudi, Susheel Choudary. Compact Implementations and Benchmarking of Two SHA-3 Finalists BLAKE and JH on FPGAs .

Degree: 2012, George Mason University

 Security and message authentication play a crucial role in communications. The current hashing standards for message authentication are SHA-1 and SHA-2. Attacks on SHA-1 which… (more)

Subjects/Keywords: SHA-3; Blake and JH; Compact Implementations; SHA-3 on FPGAs; Cryptography; Hash Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vadlamudi, S. C. (2012). Compact Implementations and Benchmarking of Two SHA-3 Finalists BLAKE and JH on FPGAs . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/7527

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vadlamudi, Susheel Choudary. “Compact Implementations and Benchmarking of Two SHA-3 Finalists BLAKE and JH on FPGAs .” 2012. Thesis, George Mason University. Accessed August 06, 2020. http://hdl.handle.net/1920/7527.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vadlamudi, Susheel Choudary. “Compact Implementations and Benchmarking of Two SHA-3 Finalists BLAKE and JH on FPGAs .” 2012. Web. 06 Aug 2020.

Vancouver:

Vadlamudi SC. Compact Implementations and Benchmarking of Two SHA-3 Finalists BLAKE and JH on FPGAs . [Internet] [Thesis]. George Mason University; 2012. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/1920/7527.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vadlamudi SC. Compact Implementations and Benchmarking of Two SHA-3 Finalists BLAKE and JH on FPGAs . [Thesis]. George Mason University; 2012. Available from: http://hdl.handle.net/1920/7527

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

5. Jégrová, Eliška. Implementace kryptografických primitiv: Implementation of cryptographic primitives.

Degree: 2019, Brno University of Technology

 This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, where are described algorithms of Blowfish and 3DES. It also… (more)

Subjects/Keywords: Kryptografie; 3DES; DES; Blowfish; SHA-3; Tiger; Cryptography; 3DES; DES; Blowfish; SHA-3; Tiger

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jégrová, E. (2019). Implementace kryptografických primitiv: Implementation of cryptographic primitives. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/41373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jégrová, Eliška. “Implementace kryptografických primitiv: Implementation of cryptographic primitives.” 2019. Thesis, Brno University of Technology. Accessed August 06, 2020. http://hdl.handle.net/11012/41373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jégrová, Eliška. “Implementace kryptografických primitiv: Implementation of cryptographic primitives.” 2019. Web. 06 Aug 2020.

Vancouver:

Jégrová E. Implementace kryptografických primitiv: Implementation of cryptographic primitives. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/11012/41373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jégrová E. Implementace kryptografických primitiv: Implementation of cryptographic primitives. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/41373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

6. Cíbik, Peter. Podpora kryptografických primitiv v jazyce P4: P4 cryptographic primitive support.

Degree: 2020, Brno University of Technology

 This diploma thesis deals with the problem of high-speed communication security which leads to the usage of hardware accelerators, in this case high-speed FPGA NICs.… (more)

Subjects/Keywords: FPGA; VHDL; Netcope P4; P4; Netcope; kryptografia; HASH; SHA – 3; FPGA; VHDL; Netcope P4; P4; Netcope; cryptography; HASH; SHA – 3

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cíbik, P. (2020). Podpora kryptografických primitiv v jazyce P4: P4 cryptographic primitive support. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/189114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cíbik, Peter. “Podpora kryptografických primitiv v jazyce P4: P4 cryptographic primitive support.” 2020. Thesis, Brno University of Technology. Accessed August 06, 2020. http://hdl.handle.net/11012/189114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cíbik, Peter. “Podpora kryptografických primitiv v jazyce P4: P4 cryptographic primitive support.” 2020. Web. 06 Aug 2020.

Vancouver:

Cíbik P. Podpora kryptografických primitiv v jazyce P4: P4 cryptographic primitive support. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/11012/189114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cíbik P. Podpora kryptografických primitiv v jazyce P4: P4 cryptographic primitive support. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/189114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

7. Lathrop, Joel. Cube attacks on cryptographic hash functions.

Degree: Computer Science (GCCIS), 2009, Rochester Institute of Technology

 Cryptographic hash functions are a vital part of our current computer sys- tems. They are a core component of digital signatures, message authentica- tion codes,… (more)

Subjects/Keywords: Cryptanalysis; Cryptography; Cube attacks; Hash functions; Security; SHA-3

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lathrop, J. (2009). Cube attacks on cryptographic hash functions. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/650

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lathrop, Joel. “Cube attacks on cryptographic hash functions.” 2009. Thesis, Rochester Institute of Technology. Accessed August 06, 2020. https://scholarworks.rit.edu/theses/650.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lathrop, Joel. “Cube attacks on cryptographic hash functions.” 2009. Web. 06 Aug 2020.

Vancouver:

Lathrop J. Cube attacks on cryptographic hash functions. [Internet] [Thesis]. Rochester Institute of Technology; 2009. [cited 2020 Aug 06]. Available from: https://scholarworks.rit.edu/theses/650.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lathrop J. Cube attacks on cryptographic hash functions. [Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/650

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

8. Andreicheva, Liliya. Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property.

Degree: Computer Science (GCCIS), 2011, Rochester Institute of Technology

 The SHA-3 competition for the new cryptographic standard was initiated by National Institute of Standards and Technology (NIST) in 2007. In the following years, the… (more)

Subjects/Keywords: Blue midnight wish; Hash function; Hashing; Keccak; Security; SHA-3

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andreicheva, L. (2011). Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/662

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andreicheva, Liliya. “Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property.” 2011. Thesis, Rochester Institute of Technology. Accessed August 06, 2020. https://scholarworks.rit.edu/theses/662.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andreicheva, Liliya. “Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property.” 2011. Web. 06 Aug 2020.

Vancouver:

Andreicheva L. Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property. [Internet] [Thesis]. Rochester Institute of Technology; 2011. [cited 2020 Aug 06]. Available from: https://scholarworks.rit.edu/theses/662.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andreicheva L. Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property. [Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/662

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

9. Rawat, Hemendra Kumar. Vector Instruction Set Extensions for Efficient and Reliable Computation of Keccak.

Degree: MS, Electrical and Computer Engineering, 2016, Virginia Tech

 Recent processor architectures such as Intel Westmere (and later) and ARMv8 include instruction-level support for the Advanced Encryption Standard (AES), for the Secure Hashing Standard… (more)

Subjects/Keywords: SIMD; Instruction Set Extensions; SHA-3; Hashing; Authenticated Encryption; Software Integrity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rawat, H. K. (2016). Vector Instruction Set Extensions for Efficient and Reliable Computation of Keccak. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/72857

Chicago Manual of Style (16th Edition):

Rawat, Hemendra Kumar. “Vector Instruction Set Extensions for Efficient and Reliable Computation of Keccak.” 2016. Masters Thesis, Virginia Tech. Accessed August 06, 2020. http://hdl.handle.net/10919/72857.

MLA Handbook (7th Edition):

Rawat, Hemendra Kumar. “Vector Instruction Set Extensions for Efficient and Reliable Computation of Keccak.” 2016. Web. 06 Aug 2020.

Vancouver:

Rawat HK. Vector Instruction Set Extensions for Efficient and Reliable Computation of Keccak. [Internet] [Masters thesis]. Virginia Tech; 2016. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/10919/72857.

Council of Science Editors:

Rawat HK. Vector Instruction Set Extensions for Efficient and Reliable Computation of Keccak. [Masters Thesis]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/72857


Virginia Tech

10. Taha, Mostafa Mohamed Ibrahim. Advances in the Side-Channel Analysis of Symmetric Cryptography.

Degree: PhD, Electrical and ComputerEngineering, 2014, Virginia Tech

 Side-Channel Analysis (SCA) is an implementation attack where an adversary exploits unintentional outputs of a cryptographic module to reveal secret information. Unintentional outputs, also called… (more)

Subjects/Keywords: Side-Channel Analysis; Practical Leakage Resiliency; AES; SHA-3

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taha, M. M. I. (2014). Advances in the Side-Channel Analysis of Symmetric Cryptography. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/79559

Chicago Manual of Style (16th Edition):

Taha, Mostafa Mohamed Ibrahim. “Advances in the Side-Channel Analysis of Symmetric Cryptography.” 2014. Doctoral Dissertation, Virginia Tech. Accessed August 06, 2020. http://hdl.handle.net/10919/79559.

MLA Handbook (7th Edition):

Taha, Mostafa Mohamed Ibrahim. “Advances in the Side-Channel Analysis of Symmetric Cryptography.” 2014. Web. 06 Aug 2020.

Vancouver:

Taha MMI. Advances in the Side-Channel Analysis of Symmetric Cryptography. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/10919/79559.

Council of Science Editors:

Taha MMI. Advances in the Side-Channel Analysis of Symmetric Cryptography. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/79559


George Mason University

11. Surapathi, Kishore Kumar. Lightweight Implementations and Power Measurements of SHA-3 Candidates on FPGAs .

Degree: 2012, George Mason University

 The National Institute of Standards and Technology (NIST) has opened a public competition for a new Secure Hash Standard, SHA-3 on Nov 2, 2007. Out… (more)

Subjects/Keywords: SHA-3; Hash Function; FPGA; Cryptography; Lightweight; Power Measurements

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Surapathi, K. K. (2012). Lightweight Implementations and Power Measurements of SHA-3 Candidates on FPGAs . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/7526

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Surapathi, Kishore Kumar. “Lightweight Implementations and Power Measurements of SHA-3 Candidates on FPGAs .” 2012. Thesis, George Mason University. Accessed August 06, 2020. http://hdl.handle.net/1920/7526.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Surapathi, Kishore Kumar. “Lightweight Implementations and Power Measurements of SHA-3 Candidates on FPGAs .” 2012. Web. 06 Aug 2020.

Vancouver:

Surapathi KK. Lightweight Implementations and Power Measurements of SHA-3 Candidates on FPGAs . [Internet] [Thesis]. George Mason University; 2012. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/1920/7526.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Surapathi KK. Lightweight Implementations and Power Measurements of SHA-3 Candidates on FPGAs . [Thesis]. George Mason University; 2012. Available from: http://hdl.handle.net/1920/7526

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


George Mason University

12. Lorentz, Robert. Evaluation of the Hardware Performance Space of SHA-3 Candidates Blue Midnight Wish and CubeHash Using FPGAs .

Degree: 2012, George Mason University

 In 2007, the National Institute of Standards and Technology (NIST) announced a public competition to develop a new cryptographic hash algorithm to become the SHA-3(more)

Subjects/Keywords: FPGA; SHA-3; Cryptography; Hash Function; Blue Midnight Wish; Cube Hash

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lorentz, R. (2012). Evaluation of the Hardware Performance Space of SHA-3 Candidates Blue Midnight Wish and CubeHash Using FPGAs . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/7496

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lorentz, Robert. “Evaluation of the Hardware Performance Space of SHA-3 Candidates Blue Midnight Wish and CubeHash Using FPGAs .” 2012. Thesis, George Mason University. Accessed August 06, 2020. http://hdl.handle.net/1920/7496.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lorentz, Robert. “Evaluation of the Hardware Performance Space of SHA-3 Candidates Blue Midnight Wish and CubeHash Using FPGAs .” 2012. Web. 06 Aug 2020.

Vancouver:

Lorentz R. Evaluation of the Hardware Performance Space of SHA-3 Candidates Blue Midnight Wish and CubeHash Using FPGAs . [Internet] [Thesis]. George Mason University; 2012. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/1920/7496.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lorentz R. Evaluation of the Hardware Performance Space of SHA-3 Candidates Blue Midnight Wish and CubeHash Using FPGAs . [Thesis]. George Mason University; 2012. Available from: http://hdl.handle.net/1920/7496

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


George Mason University

13. Vyas, Ambarish. Implementation and Benchmarking of Padding Units and HMAC for SHA-3 Candidates in FPGAs and ASICs .

Degree: 2012, George Mason University

 In 2005, a major security flaw was discovered in Secure Hash Algorithm-1 (SHA-1), an NSA-designed cryptographic hash function, standardized by National Institute of Science and… (more)

Subjects/Keywords: FPGA; Hash Function; SHA-3; Cryptography; Padding; HMAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vyas, A. (2012). Implementation and Benchmarking of Padding Units and HMAC for SHA-3 Candidates in FPGAs and ASICs . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/7512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vyas, Ambarish. “Implementation and Benchmarking of Padding Units and HMAC for SHA-3 Candidates in FPGAs and ASICs .” 2012. Thesis, George Mason University. Accessed August 06, 2020. http://hdl.handle.net/1920/7512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vyas, Ambarish. “Implementation and Benchmarking of Padding Units and HMAC for SHA-3 Candidates in FPGAs and ASICs .” 2012. Web. 06 Aug 2020.

Vancouver:

Vyas A. Implementation and Benchmarking of Padding Units and HMAC for SHA-3 Candidates in FPGAs and ASICs . [Internet] [Thesis]. George Mason University; 2012. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/1920/7512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vyas A. Implementation and Benchmarking of Padding Units and HMAC for SHA-3 Candidates in FPGAs and ASICs . [Thesis]. George Mason University; 2012. Available from: http://hdl.handle.net/1920/7512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Vilnius University

14. Orvidaitė, Halina. Statistinė SHA-3 konkurso maišos funkcijų analizė.

Degree: Master, 2014, Vilnius University

Pagrindinis magistro baigiamojo darbo tikslas buvo, pasinaudojant NIST SHA-3 maišos algoritmų kompresijos funkcijomis, sukurti pseudo-atsitiktinių skaičių generatorių ir atliktų juo sugeneruotų sekų statistinius testus. Darbo… (more)

Subjects/Keywords: Statistinė; SHA-3; Konkursas; Maišos funkcijos; Analizė; Statistical; Analysis; Hash Functions; Competition

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Orvidaitė, Halina. (2014). Statistinė SHA-3 konkurso maišos funkcijų analizė. (Masters Thesis). Vilnius University. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171509-46405 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Orvidaitė, Halina. “Statistinė SHA-3 konkurso maišos funkcijų analizė.” 2014. Masters Thesis, Vilnius University. Accessed August 06, 2020. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171509-46405 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Orvidaitė, Halina. “Statistinė SHA-3 konkurso maišos funkcijų analizė.” 2014. Web. 06 Aug 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Orvidaitė, Halina. Statistinė SHA-3 konkurso maišos funkcijų analizė. [Internet] [Masters thesis]. Vilnius University; 2014. [cited 2020 Aug 06]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171509-46405 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Orvidaitė, Halina. Statistinė SHA-3 konkurso maišos funkcijų analizė. [Masters Thesis]. Vilnius University; 2014. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171509-46405 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Université du Luxembourg

15. Nicolic, Ivica. Cryptanalysis and design of symmetric primitives.

Degree: 2011, Université du Luxembourg

 Cryptographic primitives are the basic building blocks of various cryptographic systems and protocols. Their application is based on their well established properties. The security of… (more)

Subjects/Keywords: CRYPTANALYSIS; SHA-3; BLOCK CIPHER; HASH FUNCTION; DIFFERENTIAL; Engineering, computing & technology :: Computer science [C05]; Ingénierie, informatique & technologie :: Sciences informatiques [C05]

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nicolic, I. (2011). Cryptanalysis and design of symmetric primitives. (Doctoral Dissertation). Université du Luxembourg. Retrieved from http://orbilu.uni.lu/handle/10993/15579

Chicago Manual of Style (16th Edition):

Nicolic, Ivica. “Cryptanalysis and design of symmetric primitives.” 2011. Doctoral Dissertation, Université du Luxembourg. Accessed August 06, 2020. http://orbilu.uni.lu/handle/10993/15579.

MLA Handbook (7th Edition):

Nicolic, Ivica. “Cryptanalysis and design of symmetric primitives.” 2011. Web. 06 Aug 2020.

Vancouver:

Nicolic I. Cryptanalysis and design of symmetric primitives. [Internet] [Doctoral dissertation]. Université du Luxembourg; 2011. [cited 2020 Aug 06]. Available from: http://orbilu.uni.lu/handle/10993/15579.

Council of Science Editors:

Nicolic I. Cryptanalysis and design of symmetric primitives. [Doctoral Dissertation]. Université du Luxembourg; 2011. Available from: http://orbilu.uni.lu/handle/10993/15579


Virginia Tech

16. Guo, Xu. Secure and Efficient Implementations of Cryptographic Primitives.

Degree: PhD, Electrical and Computer Engineering, 2012, Virginia Tech

 Nowadays pervasive computing opens up many new challenges. Personal and sensitive data and computations are distributed over a wide range of computing devices. This presents… (more)

Subjects/Keywords: Block Cipher; Side-Channel Attacks; SHA-3; Hash Function; System-on-Chip; Cryptographic Coprocessor; Elliptic Curve Cryptography; Fault Attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guo, X. (2012). Secure and Efficient Implementations of Cryptographic Primitives. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/27702

Chicago Manual of Style (16th Edition):

Guo, Xu. “Secure and Efficient Implementations of Cryptographic Primitives.” 2012. Doctoral Dissertation, Virginia Tech. Accessed August 06, 2020. http://hdl.handle.net/10919/27702.

MLA Handbook (7th Edition):

Guo, Xu. “Secure and Efficient Implementations of Cryptographic Primitives.” 2012. Web. 06 Aug 2020.

Vancouver:

Guo X. Secure and Efficient Implementations of Cryptographic Primitives. [Internet] [Doctoral dissertation]. Virginia Tech; 2012. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/10919/27702.

Council of Science Editors:

Guo X. Secure and Efficient Implementations of Cryptographic Primitives. [Doctoral Dissertation]. Virginia Tech; 2012. Available from: http://hdl.handle.net/10919/27702


George Mason University

17. Farahmand, Farnoud. Tools and Experimental Setup for Efficient Hardware Benchmarking of Candidates in Cryptographic Contests .

Degree: George Mason University

 Hardware benchmarking of candidates competing in cryptographic contests, such as SHA-3 and CAESAR, is very important for ranking of their suitability for standardization. A huge… (more)

Subjects/Keywords: high level synthesis; cryptography; benchmarking; SHA-3; software/hardware codesign; Zynq

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Farahmand, F. (n.d.). Tools and Experimental Setup for Efficient Hardware Benchmarking of Candidates in Cryptographic Contests . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/10729

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Farahmand, Farnoud. “Tools and Experimental Setup for Efficient Hardware Benchmarking of Candidates in Cryptographic Contests .” Thesis, George Mason University. Accessed August 06, 2020. http://hdl.handle.net/1920/10729.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Farahmand, Farnoud. “Tools and Experimental Setup for Efficient Hardware Benchmarking of Candidates in Cryptographic Contests .” Web. 06 Aug 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Farahmand F. Tools and Experimental Setup for Efficient Hardware Benchmarking of Candidates in Cryptographic Contests . [Internet] [Thesis]. George Mason University; [cited 2020 Aug 06]. Available from: http://hdl.handle.net/1920/10729.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Farahmand F. Tools and Experimental Setup for Efficient Hardware Benchmarking of Candidates in Cryptographic Contests . [Thesis]. George Mason University; Available from: http://hdl.handle.net/1920/10729

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

18. Luo, Pei. Side-channel security analysis and protection of SHA-3.

Degree: PhD, Department of Electrical and Computer Engineering, 2017, Northeastern University

 Keccak is the hash function selected by NIST as the SHA-3 (Secure Hash Algorithm) standard. Keccak is built on a new structure - sponge construction.… (more)

Subjects/Keywords: compiler; fault attacks; SHA-3; side-channel attacks

…106 Distribution of the number of recovered χ22 i bits for SHA-3 functions using Method… …103 105 111 115 List of Acronyms SHA-3 Secure Hash Algorithm 3. A subset of the… …Abstract of the Dissertation Side-Channel Security Analysis and Protection of SHA-3 by Pei Luo… …Advisor Keccak is the hash function selected by NIST as the SHA-3 (Secure Hash Algorithm… …and construction have raised questions regarding the side-channel security of SHA-3 and its… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, P. (2017). Side-channel security analysis and protection of SHA-3. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20254196

Chicago Manual of Style (16th Edition):

Luo, Pei. “Side-channel security analysis and protection of SHA-3.” 2017. Doctoral Dissertation, Northeastern University. Accessed August 06, 2020. http://hdl.handle.net/2047/D20254196.

MLA Handbook (7th Edition):

Luo, Pei. “Side-channel security analysis and protection of SHA-3.” 2017. Web. 06 Aug 2020.

Vancouver:

Luo P. Side-channel security analysis and protection of SHA-3. [Internet] [Doctoral dissertation]. Northeastern University; 2017. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/2047/D20254196.

Council of Science Editors:

Luo P. Side-channel security analysis and protection of SHA-3. [Doctoral Dissertation]. Northeastern University; 2017. Available from: http://hdl.handle.net/2047/D20254196

19. Rogawski, Marcin. Development and Benchmarking of New Hardware Architectures for Emerging Cryptographic Transformations .

Degree: 2013, George Mason University

Cryptography is a very active branch of science. Due to the everlasting struggle between Advisors/Committee Members: Gaj, Kris (advisor).

Subjects/Keywords: Computer engineering; cryptographic engineering; Edwards curves; hardware benchmarking; modular arithmetic; SHA-3 competition

…new cryptographic hash function standard, called SHA-3. The major outcome of this contest… …the five final SHA-3 finalists, Grøstl, has been inspired by Advanced Encryption Standard… …100% improvement in terms of the throughput to area ratio, when applied to 14 SHA-3 Round 2… …least until 2030 must be guarded by hash function SHA-2 with 256-bits output (SHA-3 will… …competition for a new SHA-3 function. Out of initial 51 candidates, only 5 algorithms were selected… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rogawski, M. (2013). Development and Benchmarking of New Hardware Architectures for Emerging Cryptographic Transformations . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/8372

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rogawski, Marcin. “Development and Benchmarking of New Hardware Architectures for Emerging Cryptographic Transformations .” 2013. Thesis, George Mason University. Accessed August 06, 2020. http://hdl.handle.net/1920/8372.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rogawski, Marcin. “Development and Benchmarking of New Hardware Architectures for Emerging Cryptographic Transformations .” 2013. Web. 06 Aug 2020.

Vancouver:

Rogawski M. Development and Benchmarking of New Hardware Architectures for Emerging Cryptographic Transformations . [Internet] [Thesis]. George Mason University; 2013. [cited 2020 Aug 06]. Available from: http://hdl.handle.net/1920/8372.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rogawski M. Development and Benchmarking of New Hardware Architectures for Emerging Cryptographic Transformations . [Thesis]. George Mason University; 2013. Available from: http://hdl.handle.net/1920/8372

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.