Matches in DBpedia 2014 for { <http://dbpedia.org/resource/SHA-3> ?p ?o. }
Showing items 1 to 39 of
39
with 100 items per page.
- SHA-3 abstract "SHA-3, a subset of the cryptographic primitive family Keccak (/ˈkætʃæk/, or /kɛtʃɑːk/), is a cryptographic hash function designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche, building upon RadioGatún.On October 2, 2012, Keccak was selected as the winner of the NIST hash function competition. SHA-3 is not meant to replace SHA-2, as no significant attack on SHA-2 has been demonstrated. Because of the successful attacks on MD5 and SHA-0 and theoretical attacks on SHA-1 and SHA-2, NIST perceived a need for an alternative, dissimilar cryptographic hash, which became SHA-3.SHA-3 uses the sponge construction in which message blocks are XORed into the initial bits of the state, which is then invertibly permuted. In the version used in SHA-3, the state consists of a 5×5 array of 64-bit words, 1600 bits total. The authors claim 12.5 cycles per byte on an Intel Core 2 CPU. However, in hardware implementations it is notably faster than all other finalists.Keccak's authors have proposed additional, not-yet-standardized uses for the function, including an authenticated encryption system and a "tree" hash for faster hashing on certain architectures. Keccak is also defined for smaller power-of-2 word sizes w down to 1 bit (25 bits total state). Small state sizes can be used to test cryptanalytic attacks, and intermediate state sizes (e.g., from w=4, 100 bits, to w=32, 800 bits) could potentially provide practical, lightweight alternatives.".
- SHA-3 thumbnail SpongeConstruction.svg?width=300.
- SHA-3 wikiPageExternalLink index.php?id=source_codes.
- SHA-3 wikiPageExternalLink keccak.noekeon.org.
- SHA-3 wikiPageExternalLink untwisted-a-cryptol-implementation-of-keccak-part-1.
- SHA-3 wikiPageExternalLink p423810.
- SHA-3 wikiPageExternalLink sha3.
- SHA-3 wikiPageExternalLink Keccak.java.
- SHA-3 wikiPageID "20394543".
- SHA-3 wikiPageRevisionID "606201316".
- SHA-3 certification NIST_hash_function_competition.
- SHA-3 designers "Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche.".
- SHA-3 digestSize "arbitrary".
- SHA-3 hasPhotoCollection SHA-3.
- SHA-3 name "SHA-3".
- SHA-3 speed "12.5".
- SHA-3 subject Category:NIST_hash_function_competition.
- SHA-3 comment "SHA-3, a subset of the cryptographic primitive family Keccak (/ˈkætʃæk/, or /kɛtʃɑːk/), is a cryptographic hash function designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche, building upon RadioGatún.On October 2, 2012, Keccak was selected as the winner of the NIST hash function competition. SHA-3 is not meant to replace SHA-2, as no significant attack on SHA-2 has been demonstrated.".
- SHA-3 label "Keccak".
- SHA-3 label "SHA-3".
- SHA-3 label "SHA-3".
- SHA-3 label "SHA-3".
- SHA-3 label "SHA-3".
- SHA-3 label "SHA-3".
- SHA-3 label "SHA-3".
- SHA-3 label "SHA-3".
- SHA-3 sameAs SHA-3.
- SHA-3 sameAs SHA-3.
- SHA-3 sameAs SHA-3.
- SHA-3 sameAs SHA-3.
- SHA-3 sameAs SHA-3.
- SHA-3 sameAs SHA-3.
- SHA-3 sameAs SHA-3.
- SHA-3 sameAs m.04zxcbf.
- SHA-3 sameAs Q1190947.
- SHA-3 sameAs Q1190947.
- SHA-3 wasDerivedFrom SHA-3?oldid=606201316.
- SHA-3 depiction SpongeConstruction.svg.
- SHA-3 isPrimaryTopicOf SHA-3.