Future of Information and Communication Conference (FICC) 2025
28-29 April 2025
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 4 Issue 8, 2013.
Abstract: Keccak is the latest Hash Function selected as the winner of NIST Hash Function Competition. SHA-3 is not meant to replace SHA-2 as no significant attacks on SHA-2 have been demonstrated. But it is designed in response to the need to find an alternative and dissimilar construct for Cryptographic Hash that is more fortified to attacks. In this paper we have tried to depict an analysis of the software implementation of Keccak-f[1600] based on the disk space utilization and time required to compute digest of desired sizes.
Ananya Chowdhury and Utpal Kumar Ray, “Performance Analysis of Keccak f-[1600]” International Journal of Advanced Computer Science and Applications(IJACSA), 4(8), 2013. http://dx.doi.org/10.14569/IJACSA.2013.040832
@article{Chowdhury2013,
title = {Performance Analysis of Keccak f-[1600]},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2013.040832},
url = {http://dx.doi.org/10.14569/IJACSA.2013.040832},
year = {2013},
publisher = {The Science and Information Organization},
volume = {4},
number = {8},
author = {Ananya Chowdhury and Utpal Kumar Ray}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.