2021 International Conference on Intelligent Technologies (CONIT) 2021
DOI: 10.1109/conit51480.2021.9498572
|View full text |Cite
|
Sign up to set email alerts
|

Sponge based Lightweight Cryptographic Hash Functions for IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…IoT applications must be designed to provide security, privacy, transparency, and subject to keep ethical constraints [4]. Some examples of theoretical and experimental attacks to highlight the weakness of more efficient but less secure designs of IoT applications are discussed in [5] and [6]. In [5] crypt-analysis on Photon using cube attack is conducted and found that it is possible to recover more bits of plaintext from the hash digest.…”
Section: A Iot Overviewmentioning
confidence: 99%
See 3 more Smart Citations
“…IoT applications must be designed to provide security, privacy, transparency, and subject to keep ethical constraints [4]. Some examples of theoretical and experimental attacks to highlight the weakness of more efficient but less secure designs of IoT applications are discussed in [5] and [6]. In [5] crypt-analysis on Photon using cube attack is conducted and found that it is possible to recover more bits of plaintext from the hash digest.…”
Section: A Iot Overviewmentioning
confidence: 99%
“…In photon key-recovery-based attacks remains an open issue. In [6] we can find a comparative study about the different hash function based on speed, power requirements and security. Each LWT hash function is have its own advantages and disadvantages.…”
Section: A Iot Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, researchers have recently started to explore the use of lightweight cryptographic hash functions for validating transmitted messages in Internet of Things (IoT) [17]. Given the low storage and computation power of the devices in an IoT network, traditional hash algorithms cannot be used to efficiently assert data integrity [17]. IoT is being used in a wide range of fields including healthcare, agriculture and even one's day-to-day lifestyle.…”
Section: Introductionmentioning
confidence: 99%