2022 Conference on Information Communications Technology and Society (ICTAS) 2022
DOI: 10.1109/ictas53252.2022.9744686
|View full text |Cite
|
Sign up to set email alerts
|

Resource Usage Evaluation of the PHOTON Hash Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…This model was envisioned as a secondary component in pseudo‐cryptographic and cryptographic applications, where the essential property and a satisfactory level of security were fastened. Also, in Reference 60, the authors analyzed the performance of the PHOTON hash function to assist researchers in selecting an algorithm that meets the need of an application. The experimental outcomes revealed that memory consumption maximized for a few variants when the file size increased.…”
Section: Lightweight Encryptionmentioning
confidence: 99%
“…This model was envisioned as a secondary component in pseudo‐cryptographic and cryptographic applications, where the essential property and a satisfactory level of security were fastened. Also, in Reference 60, the authors analyzed the performance of the PHOTON hash function to assist researchers in selecting an algorithm that meets the need of an application. The experimental outcomes revealed that memory consumption maximized for a few variants when the file size increased.…”
Section: Lightweight Encryptionmentioning
confidence: 99%