SPONGENT: The Design Space of Lightweight Cryptographic Hashing (original) (raw)

SPONGENT: A Lightweight Hash Function

Deniz Toz

View PDFchevron_right

Cryptographic Hash Functions and Attacks – A Detailed Study

ully fauziah

International Journal of Advanced Research in Computer Science, 2020

View PDFchevron_right

Power, Performance and Area Analysis of Sponge Based Lightweight HASH Function

Heera Wali

International Journal of Electrical and Electronic Engineering & Telecommunications

View PDFchevron_right

Neeva: A Lightweight Hash Function

Dr. Dhananjoy Dey

IACR Cryptol. ePrint Arch., 2016

View PDFchevron_right

An Efficient Lightweight Cryptography Hash Function for Big Data and IoT Applications

Zeyad Al-Odat

2020 IEEE Cloud Summit, 2020

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Guilherme Morais

View PDFchevron_right

Lightweight Cryptography: A Solution to Secure IoT

poonam jindal

Wireless Personal Communications, 2020

View PDFchevron_right

Cryptography: Recent Advances and Research Perspectives

MONTHER TARAWNEH

IntechOpen eBooks, 2023

View PDFchevron_right

A Novel Unified Architecture for Public-Key Cryptography

L. Romano

Design, Automation and Test in Europe

View PDFchevron_right

Design of an Enhanced Cryptographic Hash Function-Digest Length 512 Bits

Aloysius Bampia Bangura

View PDFchevron_right

Cryptography: A Review

Dr. Amosa Babalola

2021

View PDFchevron_right

Revisiting Security Relations Between Signature Schemes and their Inner Hash Functions

Pierre-alain Fouque

2007

View PDFchevron_right

Computation, Cryptography, and Network Security

Kostantinos Demertzis

2015

View PDFchevron_right

LHash: A Lightweight Hash Function

Le Nhan Dong

Lecture Notes in Computer Science, 2014

View PDFchevron_right

A New Generation Cryptographic Technique

Debashis Ganguly

View PDFchevron_right

TWISTERπ - a framework for secure and fast hash functions

Christian Forler

International Journal of Applied Cryptography, 2010

View PDFchevron_right

BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label

Leo Y Zhang

arXiv (Cornell University), 2022

View PDFchevron_right

Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT

Md Rafiqul Islam

IEEE Access, 2021

View PDFchevron_right

Proposal Framework to Light Weight Cryptography Primitives

Soukaena Hassan

Engineering and Technology Journal

View PDFchevron_right

Analysis and design of symmetric cryptographic algorithms

Manoj Gelli

2009

View PDFchevron_right

A new generic protocol for authentication and key agreement in lightweight systems

Olivier Markowitch

View PDFchevron_right

Cryptography: Against AI and QAI Odds

Sheetal Harris

arXiv (Cornell University), 2023

View PDFchevron_right

Whirlwind: a new cryptographic hash function

Svetla Nikova

Designs, Codes and Cryptography, 2010

View PDFchevron_right

Cayley hashes: A class of efficient graph-based hash functions

Jean-jacques Quisquater

2007

View PDFchevron_right

A Lightweight Block Cipher Implementation in the Resource – Constrained Internet of Things

Jaydwin Labiano

Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering, 2019

View PDFchevron_right

Architecture for the Secret-Key Bc3 Cryptography Algorithm

Yusuf Hadi Kurniawan

ITB Journal of Information and Communication Technology, 2011

View PDFchevron_right

A Comprehensive Survey on the Implementations, A acks, and Countermeasures of the Current NIST Lightweight Cryptography Standard

Mehran Mozaffari Kermani

View PDFchevron_right

Lyra2: efficient password hashing with high security against time-memory trade-offs

Marcos Simplício

IEEE Transactions on Computers, 2016

View PDFchevron_right

Tight Thresholds for Cuckoo Hashing via XORSAT

Martin Dietzfelbinger

Automata, Languages and Programming, 2010

View PDFchevron_right

A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard

Mehran Mozaffari Kermani

ArXiv, 2023

View PDFchevron_right

FORK-160: A New 160-bit Software-Oriented Hash Function

Hadi Ahmadi

IJCSNS, 2007

View PDFchevron_right

Advances in Cryptology - ASIACRYPT’99

Paul Leyland

Springer eBooks, 1999

View PDFchevron_right

Cryptanalysis of a lightweight certificateless signature scheme for IIOT environments

Marimuthu Karuppiah

IEEE Access, 2018

View PDFchevron_right

Secure Computation with Minimal Interaction, Revisited

Anat Paskin-Cherniavsky

Lecture Notes in Computer Science, 2015

View PDFchevron_right

Literature Survey: An investigation into the eld of cryptography and cryptographic protocols

Barry Irwin

2009

View PDFchevron_right