[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Search published articles ::
Showing 1 results for Arghavani

Dr Masoumeh Safkhani, Mr Mohamadamin Arghavani,
Volume 5, Issue 2 (3-2017)
Abstract

In recent years the security of SHA-3[1] is one of the most interesting topics in the field of cryptography. Cryptography uses Hash functions in different ways. Thus the security of Hash functions against different attacks is of vital importance. Several attacks and many analysis have been applied to SHA-3 till now but none of them could break it theoretically or practically. Keccak relies on a Sponge architecture.
In this paper, we focus on differential fault analysis attack and we review the latest attacks on SHA-3. Specifically, we describe cube attack, differential fault analysis and also describe zero-sum distinguisher attack and pre-image attack by using linear structures.
 
[1] Secure Hash Algorithm 3(SHA-3)


Page 1 from 1     

دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.06 seconds with 27 queries by YEKTAWEB 4712