-
1
Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]
Published 2025-03-01Subjects: Get full text
Article -
2
Peningkatan Keamanan Basis Data menggunakan Kombinasi Algoritma RC4 dan SHA3-512
Published 2024-08-01Subjects: “…sha3-512…”
Get full text
Article -
3
Enhancing VANET Security using Blockchain and SHA3-256 in Python
Published 2025-06-01Subjects: Get full text
Article -
4
Robust cooperative spectrum sensing in cognitive radio blockchain network using SHA-3 algorithm
Published 2024-12-01Subjects: Get full text
Article -
5
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
Published 2024-12-01Subjects: “…SHA-3…”
Get full text
Article -
6
An Area-Time Efficient Hardware Architecture for ML-KEM Post-Quantum Cryptography Standard
Published 2025-01-01Subjects: Get full text
Article