Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes
From MaRDI portal
Publication:831645
DOI10.1007/978-3-030-68890-5_8OpenAlexW3127171857MaRDI QIDQ831645
YoungBeom Kim, Hojin Choi, Seog Chung Seo
Publication date: 24 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-68890-5_8
Uses Software
Cites Work
- The first collision for full SHA-1
- Classification and generation of disturbance vectors for collision attacks against SHA-1
- Analysis of SHA-512/224 and SHA-512/256
- Second-Order Differential Collisions for Reduced SHA-256
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Improving Local Collisions: New Attacks on Reduced SHA-256
- Finding Collisions in the Full SHA-1
- Finding SHA-1 Characteristics: General Results and Applications
- New Collision Attacks against Up to 24-Step SHA-2
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes