2015
DOI: 10.13089/jkiisc.2015.25.4.749
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of SHA-3 Algorithm Based On ARM-11 Processors

Abstract: As the smart era, the use of smart devices is increasing. Smart devices are widely used to provide a human convenience, but there is a risk that information is exposed. The smart devices to prevent this problem includes the encryption algorithm. Among them, The hash function is an encryption algorithm that is used essentially to carry out the algorithm, such as data integrity, authentication, signature. As the issue raised in the collision resistance of SHA-1 has recently been causing a safety problem, and SHA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…It is widely known that the hardware implementation of SHA-3 has the advantage of faster execution than that of SHA-1 and SHA-2 [32]. However, with respect to software implementation, SHA-3 is much slower than existing hash algorithm including SHA-2 [13][14][15][16][17]. Currently, existing SHA-3 software on a variety of IoT devices, including 8-bit AVR MCUs, are implemented according to the pseudo-codes of the NIST SHA-3 standard [13][14][15][16].…”
Section: Overview Of 8-bit Avr Mcusmentioning
confidence: 99%
See 3 more Smart Citations
“…It is widely known that the hardware implementation of SHA-3 has the advantage of faster execution than that of SHA-1 and SHA-2 [32]. However, with respect to software implementation, SHA-3 is much slower than existing hash algorithm including SHA-2 [13][14][15][16][17]. Currently, existing SHA-3 software on a variety of IoT devices, including 8-bit AVR MCUs, are implemented according to the pseudo-codes of the NIST SHA-3 standard [13][14][15][16].…”
Section: Overview Of 8-bit Avr Mcusmentioning
confidence: 99%
“…However, with respect to software implementation, SHA-3 is much slower than existing hash algorithm including SHA-2 [13][14][15][16][17]. Currently, existing SHA-3 software on a variety of IoT devices, including 8-bit AVR MCUs, are implemented according to the pseudo-codes of the NIST SHA-3 standard [13][14][15][16]. The existing implementations following the pseudo-codes of the standard compute π and ρ in the combined way as π ∼ ρ rather than computing them separately, because rotate-operation (ρ) can be embedded in the process of π computation.…”
Section: Overview Of 8-bit Avr Mcusmentioning
confidence: 99%
See 2 more Smart Citations