Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes
From MaRDI portal
Publication:831645
Cites work
- Analysis of SHA-512/224 and SHA-512/256
- Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
- Classification and generation of disturbance vectors for collision attacks against SHA-1
- Finding Collisions in the Full SHA-1
- Finding SHA-1 Characteristics: General Results and Applications
- Improving local collisions: new attacks on reduced SHA-256
- New Collision Attacks against Up to 24-Step SHA-2
- Second-order differential collisions for reduced SHA-256
- The first collision for full SHA-1
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q831645)