2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS) 2019
DOI: 10.1109/csitss47250.2019.9031038
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Study of Lightweight Hashing Functions for Resource Constrained Devices of IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…The most popular lightweight hash functions include Snefru, Message Digest (MD5), the SHA family, HAVAL, KECCAK, and BLAKE [4]. Several comparative studies have been done under different conditions and environments to find the best among these algorithms.…”
Section: Iot Hash Functionsmentioning
confidence: 99%
See 2 more Smart Citations
“…The most popular lightweight hash functions include Snefru, Message Digest (MD5), the SHA family, HAVAL, KECCAK, and BLAKE [4]. Several comparative studies have been done under different conditions and environments to find the best among these algorithms.…”
Section: Iot Hash Functionsmentioning
confidence: 99%
“…Finally, KECCAK was announced the winner and designated as SHA3 [14,12] Keccac, the winner of the competition, uses the sponge-based hash design based on bit permutations. In addition to being quick in hardware implementations, it has shown resistance against multiple attacks, a high level of security, high throughput, and simplicity of design [4,13].…”
Section: Iot Hash Functionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Ensuring privacy in smart city IoT nodes is challenging for several reasons. Firstly, the CPU in IoT devices is minimal and cannot compute complex algorithms [8][9][10][11][12]. Secondly, the power consumption of the security algorithm should be low since the majority of IoT devices work with a battery [9,[11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…Firstly, the CPU in IoT devices is minimal and cannot compute complex algorithms [8][9][10][11][12]. Secondly, the power consumption of the security algorithm should be low since the majority of IoT devices work with a battery [9,[11][12][13][14][15]. Thirdly, simple sensors are connected to cover large physical network [14].…”
Section: Introductionmentioning
confidence: 99%