Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes
From MaRDI portal
Publication:831645
DOI10.1007/978-3-030-68890-5_8OpenAlexW3127171857MaRDI QIDQ831645FDOQ831645
Authors: YoungBeom Kim, Hojin Choi, Seog Chung Seo
Publication date: 24 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-68890-5_8
Cites Work
- Finding Collisions in the Full SHA-1
- Classification and generation of disturbance vectors for collision attacks against SHA-1
- Finding SHA-1 Characteristics: General Results and Applications
- Improving local collisions: new attacks on reduced SHA-256
- Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
- Topics in Cryptology – CT-RSA 2005
- The first collision for full SHA-1
- Analysis of SHA-512/224 and SHA-512/256
- Second-order differential collisions for reduced SHA-256
- New Collision Attacks against Up to 24-Step SHA-2
Uses Software
This page was built for publication: Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q831645)