{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:07Z","timestamp":1750220707292,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T00:00:00Z","timestamp":1554768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,9]]},"DOI":"10.1145\/3328833.3328879","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"145-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Enhanced SHA3-based Hashing Method"],"prefix":"10.1145","author":[{"given":"A. Samir","family":"Abo-Taleb","sequence":"first","affiliation":[{"name":"Electronics and Communications Department, Ain Shams University, Cairo, Egypt"}]},{"given":"M.","family":"Nabil","sequence":"additional","affiliation":[{"name":"Computer Science Department, Armed Forces Research and Development Center, Cairo, Egypt"}]},{"given":"M.","family":"Shalaby","sequence":"additional","affiliation":[{"name":"Egyptian Armed Forces, Arab Academy for Science Technology and Maritime Transport, Cairo, Egypt"}]},{"given":"Salwa","family":"Elramly","sequence":"additional","affiliation":[{"name":"Electronics and Communications Department, Ain Shams University, Cairo, Egypt"}]}],"member":"320","published-online":{"date-parts":[[2019,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Kollmitzer Christian Pivk Mario \"Applied Quantum Cryptography\".  Kollmitzer Christian Pivk Mario \"Applied Quantum Cryptography\"."},{"key":"e_1_3_2_1_2_1","unstructured":"Understanding Cryptography- A Textbook for Students and Practitioners- Christof Paar \u2022 Jan Pelzl.  Understanding Cryptography- A Textbook for Students and Practitioners- Christof Paar \u2022 Jan Pelzl."},{"key":"e_1_3_2_1_3_1","unstructured":"Guide to Elliptic Curve Cryptography-Darrel Hankerson Alfred Menezes Scott Vanstone.  Guide to Elliptic Curve Cryptography-Darrel Hankerson Alfred Menezes Scott Vanstone."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2"},{"key":"e_1_3_2_1_5_1","unstructured":"Jean-Philippe Aumasson Willi Meier Raphael C.-W. Phan Luca Henzen \" The Hash Function BLAKE\".   Jean-Philippe Aumasson Willi Meier Raphael C.-W. Phan Luca Henzen \" The Hash Function BLAKE\"."},{"key":"e_1_3_2_1_6_1","volume-title":"The MD4 Message Digest Algorithm","author":"R.","year":"1990","unstructured":"Rivest, R. : The MD4 Message Digest Algorithm . Springer , Heidelberg ( 1990 ) Rivest, R.: The MD4 Message Digest Algorithm. Springer, Heidelberg (1990)"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1321"},{"key":"e_1_3_2_1_8_1","unstructured":"US Department of Commerce\/National Institute of Standards and Technology: Secure Hash Standard (SHS). Fips Publication (1995)  US Department of Commerce\/National Institute of Standards and Technology: Secure Hash Standard (SHS). Fips Publication (1995)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3174"},{"key":"e_1_3_2_1_10_1","unstructured":"William Stallings \" Cryptography and Network Security\".  William Stallings \" Cryptography and Network Security\"."},{"key":"e_1_3_2_1_11_1","unstructured":"Guido Bertoni; Joan Daemen; Micha\u00ebl Peeters; Gilles Van Assche. \"The Keccak sponge function family: Specifications summary\". Retrieved 2011-05-11.  Guido Bertoni; Joan Daemen; Micha\u00ebl Peeters; Gilles Van Assche. \"The Keccak sponge function family: Specifications summary\". Retrieved 2011-05-11."},{"key":"e_1_3_2_1_12_1","unstructured":"NIST Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition.  NIST Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition."},{"key":"e_1_3_2_1_13_1","first-page":"2216","volume-title":"Research for the application and safety of md5 algorithm in password authentication,\" in Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","author":"Zheng X.","year":"2012","unstructured":"X. Zheng and J. Jin , \" Research for the application and safety of md5 algorithm in password authentication,\" in Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) , 2012 , pp. 2216 -- 2219 . X. Zheng and J. Jin, \"Research for the application and safety of md5 algorithm in password authentication,\" in Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2012, pp. 2216--2219."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2"},{"key":"e_1_3_2_1_15_1","first-page":"99","volume-title":"Yogyakarta","author":"Ratna A. P.","year":"2013","unstructured":"A. P. Ratna , P. D. Purnamasari , A. Shaugi , and A. Salman , \" Analysis and comparison of md5 and sha-1 algorithm implementation in simpleo authentication based security system,\" in Proceedings of IEEE International Conference on QiR (Quality in Research) , Yogyakarta , 2013 , pp. 99 -- 104 . A. P. Ratna, P. D. Purnamasari, A. Shaugi, and A. Salman, \"Analysis and comparison of md5 and sha-1 algorithm implementation in simpleo authentication based security system,\" in Proceedings of IEEE International Conference on QiR (Quality in Research), Yogyakarta, 2013, pp. 99--104."},{"key":"e_1_3_2_1_16_1","unstructured":"Jesse Varsalone Matthew McFadden \"Defense against the Black Arts\" in How Hackers Do What They Do and How to Protect against It.   Jesse Varsalone Matthew McFadden \"Defense against the Black Arts\" in How Hackers Do What They Do and How to Protect against It."},{"key":"e_1_3_2_1_17_1","volume-title":"Jan -","author":"Password Hashing Technique Using K. Enhancing Salted","year":"2018","unstructured":"K. Enhancing Salted Password Hashing Technique Using Swapping Elements in an Array Algorithm (IJCST Vol . 9 , Issue 1 , Jan - March 2018 ). K. Enhancing Salted Password Hashing Technique Using Swapping Elements in an Array Algorithm (IJCST Vol. 9, Issue 1, Jan - March 2018)."},{"issue":"1","key":"e_1_3_2_1_18_1","first-page":"04","volume":"43","author":"Boonkrong Sirapat","unstructured":"Sirapat Boonkrong , Chaowalit Somboonpattanakit ,\" Dynamic Salt Generation and Placement for Secure Password Storing\" , IAENG International Journal of Computer Science , 43 : 1 , IJCS_43_1_ 04 . Sirapat Boonkrong, Chaowalit Somboonpattanakit,\" Dynamic Salt Generation and Placement for Secure Password Storing\", IAENG International Journal of Computer Science, 43:1, IJCS_43_1_04.","journal-title":"IAENG International Journal of Computer Science"},{"volume-title":"Proceedings of the 6th International Conference on FICTA.","author":"Satapathy Suresh Chandra","key":"e_1_3_2_1_19_1","unstructured":"Suresh Chandra Satapathy , Joao Manuel R.S. Tavares , Vikrant Bhateja , J. R. Mohanty , \" Information and Decision Sciences\" in Proceedings of the 6th International Conference on FICTA. Suresh Chandra Satapathy, Joao Manuel R.S. Tavares, Vikrant Bhateja, J. R. Mohanty, \"Information and Decision Sciences\" in Proceedings of the 6th International Conference on FICTA."},{"key":"e_1_3_2_1_20_1","unstructured":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications- Special Publication 800-22 Revision 1a.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications- Special Publication 800-22 Revision 1a."},{"key":"e_1_3_2_1_21_1","unstructured":"FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION-SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions- FIPS PUB 202.  FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION-SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions- FIPS PUB 202."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the International Conference on CIDM","author":"Behera Himansu Sekhar","year":"2015","unstructured":"Himansu Sekhar Behera , Durga Prasad Mohapatra , \" Computational Intelligence in Data Mining--- Volume 2 \" in Proceedings of the International Conference on CIDM , 5-6 December 2015 . Himansu Sekhar Behera, Durga Prasad Mohapatra, \" Computational Intelligence in Data Mining---Volume 2 \" in Proceedings of the International Conference on CIDM, 5-6 December 2015."},{"key":"e_1_3_2_1_23_1","unstructured":"James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang Raymond Choo \"Advanced Multimedia and Ubiquitous Engineering\" in proceedings of the 11th International Conference on Multimedia and Ubiquitous Engineering (MUE2017) and the 12th International Conference on Future Information Technology (FutureTech2017).  James J. (Jong Hyuk) Park Shu-Ching Chen Kim-Kwang Raymond Choo \"Advanced Multimedia and Ubiquitous Engineering\" in proceedings of the 11th International Conference on Multimedia and Ubiquitous Engineering (MUE2017) and the 12th International Conference on Future Information Technology (FutureTech2017)."}],"event":{"name":"ICSIE '19: 2019 8th International Conference on Software and Information Engineering","acronym":"ICSIE '19","location":"Cairo Egypt"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328833.3328879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3328833.3328879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:04Z","timestamp":1750199584000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328833.3328879"}},"subtitle":["A Side-channel attack countermeasure"],"short-title":[],"issued":{"date-parts":[[2019,4,9]]},"references-count":23,"alternative-id":["10.1145\/3328833.3328879","10.1145\/3328833"],"URL":"https:\/\/doi.org\/10.1145\/3328833.3328879","relation":{},"subject":[],"published":{"date-parts":[[2019,4,9]]},"assertion":[{"value":"2019-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}