Performance Analysis of Keccak f-[1600]
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 8
Abstract
Keccak is the latest Hash Function selected as the winner of NIST Hash Function Competition. SHA-3 is not meant to replace SHA-2 as no significant attacks on SHA-2 have been demonstrated. But it is designed in response to the need to find an alternative and dissimilar construct for Cryptographic Hash that is more fortified to attacks. In this paper we have tried to depict an analysis of the software implementation of Keccak-f[1600] based on the disk space utilization and time required to compute digest of desired sizes.
Authors and Affiliations
Ananya Chowdhury, Utpal Ray
Modeling of Quadrotor Roll Loop using Frequency Identification Method
Model estimation is an important step in quadrotor control design because model uncertainties can cause unstable behavior especially with non-robust control methods. In this paper, a modeling approach of a quadrotor prot...
UML based Formal Model of Smart Transformer Power System
Recently many significant improvements have been done in traditionally power system. But still a lot of work is needed in traditional power system to mend many challenges. We propose formal method based on subnet model f...
QUATERNIONIC WIGNER-VILLE DISTRIBUTION OF ANALYTICAL SIGNAL IN HYPERSPECTRAL IMAGERY
The 2D Quaternionic Fourier Transform (QFT), applied to a real 2D image, produces an invertible quaternionic spectrum. If we conserve uniquely the first quadrant of this spectrum, it is possible, after inverse transforma...
Computing knowledge and Skills Demand: A Content Analysis of Job Adverts in Botswana
Existing Trends of Digital Watermarking and its Significant Impact on Multimedia Streaming: A Survey
Nowadays digital media has reached the general level of resource sharing system and become a convenient way for sharing lots of information among various individuals. However, these digital data are stored and shared ove...