SPONGENT: The Design Space of Lightweight Cryptographic Hashing (original) (raw)
Related papers
SPONGENT: A Lightweight Hash Function
Cryptographic Hash Functions and Attacks – A Detailed Study
International Journal of Advanced Research in Computer Science, 2020
Power, Performance and Area Analysis of Sponge Based Lightweight HASH Function
International Journal of Electrical and Electronic Engineering & Telecommunications
Neeva: A Lightweight Hash Function
IACR Cryptol. ePrint Arch., 2016
An Efficient Lightweight Cryptography Hash Function for Big Data and IoT Applications
2020 IEEE Cloud Summit, 2020
HANDBOOK of APPLIED CRYPTOGRAPHY
Lightweight Cryptography: A Solution to Secure IoT
Wireless Personal Communications, 2020
Cryptography: Recent Advances and Research Perspectives
IntechOpen eBooks, 2023
A Novel Unified Architecture for Public-Key Cryptography
Design, Automation and Test in Europe
Design of an Enhanced Cryptographic Hash Function-Digest Length 512 Bits
2021
Revisiting Security Relations Between Signature Schemes and their Inner Hash Functions
2007
Computation, Cryptography, and Network Security
2015
LHash: A Lightweight Hash Function
Lecture Notes in Computer Science, 2014
A New Generation Cryptographic Technique
TWISTERπ - a framework for secure and fast hash functions
International Journal of Applied Cryptography, 2010
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
arXiv (Cornell University), 2022
Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT
IEEE Access, 2021
Proposal Framework to Light Weight Cryptography Primitives
Engineering and Technology Journal
Analysis and design of symmetric cryptographic algorithms
2009
A new generic protocol for authentication and key agreement in lightweight systems
Cryptography: Against AI and QAI Odds
arXiv (Cornell University), 2023
Whirlwind: a new cryptographic hash function
Designs, Codes and Cryptography, 2010
Cayley hashes: A class of efficient graph-based hash functions
2007
A Lightweight Block Cipher Implementation in the Resource – Constrained Internet of Things
Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering, 2019
Architecture for the Secret-Key Bc3 Cryptography Algorithm
ITB Journal of Information and Communication Technology, 2011
Lyra2: efficient password hashing with high security against time-memory trade-offs
IEEE Transactions on Computers, 2016
Tight Thresholds for Cuckoo Hashing via XORSAT
Automata, Languages and Programming, 2010
ArXiv, 2023
FORK-160: A New 160-bit Software-Oriented Hash Function
IJCSNS, 2007
Advances in Cryptology - ASIACRYPT’99
Springer eBooks, 1999
Cryptanalysis of a lightweight certificateless signature scheme for IIOT environments
IEEE Access, 2018
Secure Computation with Minimal Interaction, Revisited
Lecture Notes in Computer Science, 2015
Literature Survey: An investigation into the eld of cryptography and cryptographic protocols
2009