2014
DOI: 10.5626/jok.2014.41.11.885
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation of an SHA-3 Hash Function Validation Program and Hash Algorithm on 16bit-UICC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…It is widely known that the hardware implementation of SHA-3 has the advantage of faster execution than that of SHA-1 and SHA-2 [32]. However, with respect to software implementation, SHA-3 is much slower than existing hash algorithm including SHA-2 [13][14][15][16][17]. Currently, existing SHA-3 software on a variety of IoT devices, including 8-bit AVR MCUs, are implemented according to the pseudo-codes of the NIST SHA-3 standard [13][14][15][16].…”
Section: Overview Of 8-bit Avr Mcusmentioning
confidence: 99%
See 3 more Smart Citations
“…It is widely known that the hardware implementation of SHA-3 has the advantage of faster execution than that of SHA-1 and SHA-2 [32]. However, with respect to software implementation, SHA-3 is much slower than existing hash algorithm including SHA-2 [13][14][15][16][17]. Currently, existing SHA-3 software on a variety of IoT devices, including 8-bit AVR MCUs, are implemented according to the pseudo-codes of the NIST SHA-3 standard [13][14][15][16].…”
Section: Overview Of 8-bit Avr Mcusmentioning
confidence: 99%
“…However, with respect to software implementation, SHA-3 is much slower than existing hash algorithm including SHA-2 [13][14][15][16][17]. Currently, existing SHA-3 software on a variety of IoT devices, including 8-bit AVR MCUs, are implemented according to the pseudo-codes of the NIST SHA-3 standard [13][14][15][16]. The existing implementations following the pseudo-codes of the standard compute π and ρ in the combined way as π ∼ ρ rather than computing them separately, because rotate-operation (ρ) can be embedded in the process of π computation.…”
Section: Overview Of 8-bit Avr Mcusmentioning
confidence: 99%
See 2 more Smart Citations