2013
DOI: 10.1007/978-3-642-37288-9_11
|View full text |Cite
|
Sign up to set email alerts
|

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

Abstract: Abstract. The pervasive diffusion of electronic devices in security and privacy sensitive applications has boosted research in cryptography. In this context, the study of lightweight algorithms has been a very active direction over the last years. In general, symmetric cryptographic primitives are good candidates for low-cost implementations. For example, several previous works have investigated the performance of block ciphers on various platforms. Motivated by the recent SHA3 competition, this paper extends … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(37 citation statements)
references
References 15 publications
0
35
0
2
Order By: Relevance
“…Instead, we base our recommendations on Balasch et al [2], in which a wide selection of 25 different hash functions, written in hand-optimized assembly, are presented. The implementations in [2] are for an 8-bit Atmel AVR chip, and thus not directly transferable to the chips that we have investigated. However, the required code sizes can be used as a relative size indicator.…”
Section: B On the Selection Of A Hashmentioning
confidence: 99%
See 2 more Smart Citations
“…Instead, we base our recommendations on Balasch et al [2], in which a wide selection of 25 different hash functions, written in hand-optimized assembly, are presented. The implementations in [2] are for an 8-bit Atmel AVR chip, and thus not directly transferable to the chips that we have investigated. However, the required code sizes can be used as a relative size indicator.…”
Section: B On the Selection Of A Hashmentioning
confidence: 99%
“…Table 3 clearly shows that the STM32F100R8 microcontroller has plenty entropy left over in its SRAM pattern for Table 3: Hash function SRAM requirements and influence on SRAM entropy in STM32F100R8 (8 KiB SRAM). SRAM consumption data from [2]. Remaining min-entropy based on a pessimistic min-entropy estimate of 3% (see Section 3.3).…”
Section: B On the Selection Of A Hashmentioning
confidence: 99%
See 1 more Smart Citation
“…Targeting usage of LWCs in automotive industries [6] surveyed the same in terms of hardware area (gate equivalent), energy consumption and latency while in [7] analyzes various LWCs with respect to energy as metric. Using ATMEL AVR ATtiny45 8-bit microcontroller as common platform performance of different LWCs have been evaluated w.r.t RAM usage, code size and cycle count for smart devices in [8]. In [9], side-channel resistance of lightweight weight block ciphers has been studied concerning software implementations, while [10] discusses mistakes in IEEE standard P1735 itself that allows successful launch of attack vectors to recover plaintext.…”
Section: Related Workmentioning
confidence: 99%
“…Implementation on sensor nodes is very hardware-dependent; optimization can be done for certain functions depending on the capacities and the design of the hardware. Thus comparing different implementations on different motes is not really conclusive, as is shown in [30][31][32][33]. The same applies for comparison by simulation, which is even less conclusive because simulation does not give an idea about how complex the operations are.…”
Section: Evaluationsmentioning
confidence: 99%