pith. machine review for the scientific record. sign in

arxiv: 1510.02856 · v2 · submitted 2015-10-10 · 💻 cs.CR

Recognition: unknown

Sponges and Engines: An introduction to Keccak and Keyak

Authors on Pith no claims yet
classification 💻 cs.CR
keywords keyakencryptionauthenticateddocumentkeccakunderlyingwellaims
0
0 comments X
read the original abstract

In this document we present an introductory overview of the algorithms and design components underlying the Keccac cryptographic primitive and the Keyak encryption scheme for authenticated (session-supporting) encryption. This document aims to familiarize readers with the basic principles of authenticated encryption, the Sponge and Duplex constructions (full-state, keyed as well as regular versions), the permutation functions underlying Keccak and Keyak as well as Keyak v2's Motorist mode of operation.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Neural Information Causality

    quant-ph 2026-05 unverdicted novelty 7.0

    Neural-IC separates embedding inequalities from capacity bounds in query-separated computations, with one-bit RAC benchmarks and CHSH-layer stability selecting the Tsirelson threshold for quantum enhancements.